System Analysis & Design - Chapter 6

Ace your homework & exams now with Quizwiz!

Relationship

(diamond or line) shows the association between two entities, has a parent entity and a child entity; is described with a verb phrase; has cardinality; has modality; is dependent or independent

Attribute

(oval or square) is a property of an entity; should be used by at least one business process; is broken down to its most useful level of detail

Transport Layer Security (TLS)

an Internet standard equivalent to SSL

IP Security (IPSec)

an Internet standard for secure transmission of low-level network packets

Hypertext Transfer Protocol Secure (HTTPS)

an Internet standard for securely transmitting Web pages

Transport Layer Security (TLS)

an advanced version of Secure Sockets Layer (SSL) protocol used to transmit information over the Internet securely

Hypertext Transfer Protocol Secure (HTTPS)

an encrypted form of information transfer on the Internet that combines HTTP and TLS

asymmetric key encryption

an encryption method that uses different keys to encrypt and decrypt data

symmetric key encryption

an encryption method that uses the same key to encrypt and decrypt the data

Deliverable

an end product of an SDLC phase

cloud computing

an extension of virtual servers in which the resources available include computing, storage, and Internet access and appear to have unlimited availability

Prototyping

an information-gathering technique useful in seeking: - User reactions - Suggestions - Innovations - Revision plans

digital certificate

an institution's name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party

Repository

an integrated and standard database which is the common method for providing product and tool integration - also known as project dictionary or workbook

Prototyping

an iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between an analyst and users

Rational Unified Process (RUP)

an object oriented systems development methodology. Establishes four phases of development: inception, elaboration, construction, and transition. Each phase is organized into a number of separate iterations

Project workbook

an online or hard-copy repository for all project correspondence, inputs, outputs, deliverables, procedures, and standards that is used for performing project audits, orienting new team members, communicating with management and customers, identifying future projects, and performing post-project reviews (diagrams, charts, system descriptions)

Project identification and selection

an organization determines whether resources should be devoted to the development or enhancement of each system under consideration

Resources

any person, group of people, piece of equipment, or material used in accomplishing an activity

An object has certain ____, like the make, model, and color of a car.

attributes

If ____ are similar to adjectives that describe the characteristics of an object, objects are similar to nouns

attributes

The number of ____ needed to describe an object depends on the business requirements of the information system and its users.

attributes

architectural design

broad design of the overall system structure; also called general design or conceptual design

Prototyping

build a prototype that can be modified before the actual system is installed

Duration

calender time to complete a task

A(n) ____ is a group of similar objects.

class

Information system

collection of hardware, software, people, procedures, data, and the Internet

Iteration

completing a full systems development life cycle

Information Systems Analysis and Design

complex organizational process whereby computer based information systems are developed and maintained

Methodologies

comprehensive, multi-step approaches to systems development that will guide work and influence the quality of the final information system that are consistent with its general management style of a organization

CASE tools

computer aided software engineering tools - software tools that provide automated support for some portion of the systems development process

Design Activity Inputs

consist of the models that were built during analysis

value limit controls

controls that check numeric data input to ensure that the value is reasonable

completeness controls

controls that ensure that all required data values describing an object or transaction are present

data validation controls

controls that ensure that numeric fields fields that contain codes or identifiers are correct

output controls

controls that ensure that output arrives at the proper destination and is accurate, current, and complete

input controls

controls that prevent invalid or erroneous data from entering the system

security controls

controls that protect the assets of an organization from all threats, with a primary focus on external threats

integrity controls

controls that reject invalid data inputs, prevent unauthorized data outputs, and protect data and programs against accidental or malicious tampering

field combination controls

controls that review combinations of data inputs to ensure that the correct data are entered

Design Activities

correspond to components of the new system -the environment -application components -user interface -database -software classes and models

Phase 1: Preliminary investigation

define the problem, suggest alternative systems, prepare a short report

In order to reduce the number of joins that must be performed in a query and to increase the speed of data access, the data analyst will ___ the physical model.

denormalize

Phase 3: Systems Design

design alternative systems (economic feasibility, technical feasibility, and operational feasibility), select the best system, write systems design report

Types of Conversion:

direct approach, parallel approach, pilot approach, and phased approach

An ___ is less expensive and easier for novice users to use, but it does not have the features that are necessary to support mission-critical or large scale systems.

end-user database management system

An ___ can support large volumes of data and support applications that run an entire company.

enterprise database management system

What do you consider when identifying and selecting IS development projects?

existing and available resources, perceived and real needs, list of potential and ongoing projects, current organizational environment, evaluation criteria

If the data model does not have any repeating fields it is in ___.

first normal form

Phase 2: Systems analysis

gather data, analyze data, and document systems analysis (systems analysis report)

Interviewing groups:

in a group interview several key people are interviewed at once make sure all of the important people are interviewed

Slack time

includes nodes that are not on the critical path, that can be delayed without delaying the final completion of the project, that allow the project manager some flexibility in scheduling

Ad Hoc approach

individuals are free to find and develop reusable assets on their own

In an object-oriented system, objects can ____ certain attributes from other objects

inherit

A(n) ____ is a specific member of a class.

instance

Your red Mustang is a(n) ____ of the CAR class.

instance

To improve the access speed of a database, similar records in a table are stored together in primary key order. This optimizing access speed process is called ___.

intrafile clustering

Rapid Applications Development (RAD)

involves the use of powerful development software, small specialized teams, and highly trained personal

Application Component

is a well defined unit of software that performs some functions

Application software

is computer software designed to support specific organizational functions and processes (inventory management, payroll, market analysis) an important result of systems analysis and design

JAD:

joint application design; A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements.

Closed-ended questions

like objective questions on an examination, can follow several forms, including the following choices: • True or false. • Multiple choice (with only one response or selecting all relevant choices). • Rating a response or idea on a scale, say from bad to good or strongly agree to strongly disagree. Each point on the scale should have a clear and consistent meaning to each person, and there is usually a neutral point in the middle of the scale. • Ranking items in order of importance.

detail design

low-level design that includes the design of the specific program details

M:N

many entity can refer

Not Null

means that an instance in the related entity must exist for an instance in another entity to be valid

Null

means that no instance in the related entity is necessary for an instance in another entity to be valid

A ____ is a command that tells an object to perform a certain method.

message

A(n) ____ defines specific tasks that an object can perform.

method

Your car performs a(n) ____ called OPERATE WIPERS when you send a message by moving the proper control.

method

Symmetric Key Encryption

method that uses the same key to encrypt and decrypt

An object's ____ are the tasks or functions the object performs.

methods

A major advantage of O-O designs is that systems analysts can save time and avoid errors by using ____ objects.

modular

Software

most obvious end product of the SDLC

Pilot approach

new system is tired out in only one part of the organization

Null

no instance in one entity has to exist for the other to exist

• Good systems analyst characteristics:

o Impertinence- questioning everything o Impartiality- consider all issues to find the best organizational solution o Relax contraints- assume anything is possible o Reframing- challenge yourself to new ways

A(n) ____ represents a real person, place, event, or transaction.

object

The type of database that is most capable of supporting complex data types is ___.

object-oriented DBMS

Content Filtering

occurs when organizations use software that filters content to prevent the transmission of unauthorized information ex. University Email Quarantine

Parallel approach

old and new systems operate side by side (parallel) until new one proves to be reliable

1:1

one entity can only relate to one entity

1:N

one entity can refer to one to many instances in another entity

Not Null

one entity must exist so the other entity can exist

Service Level Agreement (SLA)

part of the contract between a business and a hosting company that guarantees a specific level of system availability

Techniques

particular processes that an analyst will follow to help ensure work is well thought out, complete and comprehensible to others that provide support for a wide range of tasks.

registered users

people who are authorized to access the system

unauthorized users

people who aren't access to any part or function of the system

privileged users

people who have access to the source code, executable program, and database structure of the program

The concept that a message gives different meanings to different objects is called ____.

polymorphism

Close-ended questions

questions in interviews that ask those responding to choose from among a set of specified responses

closed-ended questions

questions in interviews that ask those responding to choose from among a set of specified responses

Open ended questions:

questions in interviews that have no prespecified answers.

The UML represents an object as a(n) ____ with the object name at the top, followed by the object's attributes and methods.

rectangle

The process of ensuring that values linking tables together through the primary and foreign keys are valid and correctly synchronized is ___.

referential integrity

Cardinality

refers to the number of times instances in one entity can be related to instances in another entity

Modality

required or not

A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in ___ normal form.

second

Analysis

second phase of the SDLC in which system requirements are studied and structured. Includes requirements determination and studying the requirements and structure them according to their interrelationships and eliminate redundancies The output of this phase = description of the alternative solution recommended

E)all of the above

selection rules for an identifier: A)choose a candidate key that will not change its value B)chose a candidate key that will never be null C)avoid using intelligent keys D)consider substituting single value surrogate keys for large composite keys E) all of the above

System flowcharts

show the flow of input data to processing and finally to output, or distribution of information

Physical Data Model

shows how the data will actually be stored in databases or files.

Grid charts

shows relationship between output and input documents

Data flow diagram

shows the data flow within an information system

Logical Data Model

shows the organization of data without indicating how it is stored, created, or manipulated.

Tokens

small electronic devices that change user passwords automatically

Automated design tools or CASE (Computer Aided Software Design)

software packages that evaluate hardware and software alternatives according to requirements given by the systems analyst

Objects can have a specific attribute called a(n) ____.

state

The ____ of an object is an adjective that describes the object's current status.

state

A relational database may be optimized for ___.

storage efficiency and speed of access

Which of the following is NOT a characteristic of current object-relational databases?

support for inheritance

Security feasibilty

system criticality, vulnerability, and threat

OOAD

system development methodologies and techniques based on objects rather than data or processes - often called the third approach to systems development, after the process - oriented and data - oriented approaches

Phase 6: Systems Maintenance

systems audit and periodic evaluation

Rapid Application Development (RAD)

systems development methodology created to radically decrease the time needed to design and implement information systems. Relies on extensive user involvement, prototyping, integrated CASE tools, and code generators System developers and end users work together jointly in real time to develop systems

Informational

systems: the way people actually do things

SQL operates on ___.

tables of data at a time

What is required for a task to be considered manageable?

task can be done by one person or group has known method or technique has predecessor and successor steps is measurable (% completed can be determined)

Digital Signature

technique where a document is encrypted using a private key

Disruptive technologies

technologies that enable breaking long-held business rules that inhibit organizations from making radical business changes

Describe the use of metadata

terms that provide structure for data in a structured repository (database)

Total slack time

the amount of time a task can be delayed without delaying the completion of the project

Free slack time

the amount of time a task can be delayed without delaying the early start of any immediately following tasks

server computer

the central computer that provides services (such as database access) to the client computers over a network

client computers

the computers at which the users work to perform their computational tasks

Maintenance

the final phase in the SDLC in which an information system is systematically repaired and improved Make the changes that users ask for and modify the system to reflect changing business conditions

Project Closedown

the final phase of the project management process that focuses on bringing a project to an end (natural or unnatural end)

Planning

the first phase in the SDLC in which an organization's total information system needs are identified, analyzed, prioritized, and arranged.

Project initiation

the first phase of the project management process in which activities are performed to assess the size, scope, and complexity of the project and to establish procedures to support later project activities

Transmission Control Protocol/ Internet Protocol (TCP/IP)

the foundation protocol of the Internet; used to provide reliable delivery of messages between networked computers

Implementation

the fourth phase in the SDLC in which the information system is coded, tested, installed, and supported in the organization. The detailed physical specifications are handed over to programmers. Also includes: initial user support, finalization of documentation, training programs are finalized

Biometrics

the identification of a user based on a physical characteristics, such as a fingerprint, iris, face, voice, or handwriting

Phased approach

the new system is implemented gradually over a period of time (in phases)

Formal system

the official way a system works as described in organizational documentation

business logic layer or domain layer

the part of a three-layer architecture that contains the programs that implement the business rules and processes

data layer

the part of a three-layer architecture that interacts with the data

Logical Design

the part of the design phase of the SDLC in which all functional features of the system chosen for development in analysis are described independently of any computer platform Makes sure the system functions as intended - business aspects of the system

Physical Design

the part of the design phase of the SDLC in which the logical specifications of the systems from logical design are transformed into technology-specific details from which all programming and system construction can be accomplished

view layer

the part of the three-layer architecture that contains the user interface

Scribe

the person who makes the detailed notes of the happenings at a Joint Application Design session

Outsourcing

the practice of turning over responsibility for some to all of an organization's information systems applications and operations to an outside firm

Hypertext Markup Language (HTML)

the predominant language for constructing Web pages and which consists of tags and rules about how to display pages

Normalization

the process analysts use to validate data models.

authorization

the process of allowing or restricting a specific authenticated user's access to a specific resource based on an access control list

encryption

the process of altering data so unauthorized users can't view them

value chain analysis

the process of analyzing an organization's activities to determine where value is added to products and/or services and the costs incurred for doing so

decryption

the process of concerting encrypted data back to their original state

Work Breakdown Structure

the process of dividing the project into manageable tasks and logically ordering them to ensure a smooth evolution between tasks - some tasks may be performed in parallel, while others must follow a sequential pattern

authentication

the process of identifying users who request access to sensitive resources

System Design

the process of organizing and structuring the components of a system to enable the construction of the new system

hosting

the process of providing physical servers at a secure location and selling those services to other businesses that wish to deploy Web sites

multi factor authentication

the process of using multiple authentication methods for increased reliability

Inheritance

the property that occurs when entity types or object classes are arranged in a hierarchy and each entity type or object class assumes that attributes and methods of its ancestors. Allows new but related classes to be derived from existing classes

Cloud Computing

the provision of computing resources, including applications, over the internet, so customers do not have to invest in the hardware and software needed to run and maintain the resources

Business process reengineering (BPR)

the search for, and implementation of, the radical change in business processes to achieve breakthrough improvements in products and services

Project planning

the second phase of the project management process that focuses on defining clear, discrete activities and the work needed to complete each activity within a single project

Critical Path

the shortest time in which a project can be completed

Key business processes

the structured, measured set of activities designed to produce a specific output for a particular customer or market

Design

the third phase of the SDLC in which the description of the recommended solution is converted into logical and then physical systems specifications

Project execution

the third phase of the project management process in which the plans created in the prior phases (initiation and planning) are put into action, puts the BPP into action, execution occurs primarily during the analysis, design, and implementation phases

JAD session leader

the trained individual who plans and leads Joint Application Design sessions

Resue

the use of previously written software resources, especially objects and components, in new applications

Informal system

the way a system actually works

Optimized Processes

this is a theoretical level in the development organization where the environment drives the process. Efforts can be channeled into improving the process rather than executing it.

Phase 5: Systems Implementation (Conversion)

types of conversion and training

Agile/ Iteration Projects

typically build fewer models, but models are still created

Tools

typically computer programs that make it easy to use and benefit from techniques to faithfully follow the guidelines of the overall development methodology

An ___ is basically an electronic list of information that is stored on a disk.

unordered sequential access file

An ___ occurs when data are stored redundantly in a database and only some of the instances are updated when a change is needed.

update anomaly

Top-down analysis method

used to identify top-level components of complex systems

Object

usually correspond to real things an information system deals with. Is a structure that encapsulates (or packages) attributes and methods that operate on those attributes. Is an abstraction of a real-word thing in which data and processes are placed together to model the structure and behavior of the real-world thing

Directly observing others:

watching others doing their jobs to determine what improvements need to be made to the system as a whole

Application Component

well defined unit of software that performs one or more specific tasks

peer-to-peer connection

when independent computers communicate and share resources without the need of a centralized server computer

certifying authorities

widely accepted issuers of digital certificates

boundary

​A ______ class is a class such as a user interface class that is visible from the outside world.

False

​A lifeline indicates when a method is executing for a destination object.​

False

​A timeline on a communication diagram indicates the sequence of the messages.

:Vehicle _______

​A vehicle object is denoted with the following label.

Class responsibility collaboration

​CRC stands for what?

False

​In the design of a complex use case, both a communication diagram and a sequence diagram may be needed.

use case controller

​System designers frequently create a class called a ____ that can serve as a collection point for incoming messages.

use case controller

​The _________________ pattern is based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.

colon

​When denoting a specific object in a sequence diagram, a ____ serves as the divider between the object name and the specific object identifier.

design class diagram

​Which diagram is directly used to identify methods and write programming code for object-oriented systems?

visibility name:type-expression = initial-value{property}

​Which of the following is correct UML notation for an attribute in a design class?

Use case specific

​____ methods must be included in a design class diagram.

separation of responsibilities

​______ ______ ______ is a design principle that recommends segregating classes into separate packages based on primary focus of responsibility.

Dependency relationships

​_____________ ____________ are relationships among elements that indicate which elements affect other elements in a system.

The process of determining requirements:

• Impertinence: You should question everything. You need to ask questions such as: Are all transactions processed the same way? Could anyone be charged something other than the standard price? Might we someday want to allow and encourage employees to work for more than one department? • Impartiality: Your role is to find the best solution to a business problem or opportunity. It is not, for example, to find a way to justify the purchase of new hardware or to insist on incorporating what users think they want into the new system requirements. You must consider issues raised by all parties and try to find the best organizational solution. • Relax constraints: Assume that anything is possible and eliminate the infeasible. For example, do not accept this statement: "We've always done it that way, so we have to continue the practice." Traditions are different from rules and policies. Traditions probably started for a good reason but, as the organization and its environment change, they may turn into habits rather than sensible procedures. • Attention to details: Every fact must fit with every other fact. One element out of place means that even the best system will fail at some time. For example, an imprecise definition of who a customer is may mean that you purge customer data when a customer has no active orders, yet these past customers may be vital contacts for future sales. • Reframing: Analysis is, in part, a creative process. You must challenge yourself to look at the organization in new ways. You must consider how each user views his or her requirements. You must be careful not to jump to the following conclusion: "I worked on a system like that once—this new system must work the same way as the one I built before."

Analyzing documents and procedures:

• Problems with existing systems (e.g., missing information or redundant steps) • Opportunities to meet new needs if only certain information or information processing were available (e.g., analysis of sales based on customer type) • Organizational direction that can influence information system requirements (e.g., trying to link customers and suppliers more closely to the organization) • Titles and names of key individuals who have an interest in relevant existing systems (e.g., the name of a sales manager who led a study of buying behavior of key customers) • Values of the organization or individuals who can help determine priorities for different capabilities desired by different users (e.g., maintaining market share even if it means lower short-term profits) • Special information processing circumstances that occur irregularly that may not be identified by any other requirements determination technique (e.g., special handling needed for a few very large-volume customers and that requires use of customized customer ordering procedures) • The reason why current systems are designed as they are, which can suggest features left out of current software, which may now be feasible and more desirable (e.g., data about a customer's purchase of competitors' products were not available when the current system was designed; these data are now available from several sources) • Data, rules for processing data, and principles by which the organization operates that must be enforced by the information system (e.g., each customer is assigned exactly one sales department staff member as a primary contact if the customer has any questions)

Prototyping also has some drawbacks as a tool for requirements determination. These include the following:

• Prototypes have a tendency to avoid creating formal documentation of system requirements, which can then make the system more difficult to develop into a fully working system. • Prototypes can become very idiosyncratic to the initial user and difficult to diffuse or adapt to other potential users. • Prototypes are often built as stand-alone systems, thus ignoring issues of sharing data and interactions with other existing systems, as well as issues with scaling up applications. • Checks in the SDLC are bypassed so that some more subtle, but still important, system requirements might be forgotten (e.g., security, some data entry controls, or standardization of data across systems).

Components of an organization:

• The business objectives that drive what and how work is done • The information people need to do their jobs • The data (definition, volume, size, etc.) handled within the organization to support the jobs • When, how, and by whom or what the data are moved, transformed, and stored • The sequence and other dependencies among different data-handling activities • The rules governing how data are handled and processed • Policies and guidelines that describe the nature of the business and the market and environment in which it operates • Key events affecting data values and when these events occur

Prototyping is most useful for requirements determination when:

• User requirements are not clear or well understood, which is often the case for totally new systems or systems that support decision making • One or a few users and other stakeholders are involved with the system • Possible designs are complex and require concrete form to fully evaluate • Communication problems have existed in the past between users and analysts and both parties want to be sure that system requirements are as specific as possible • Tools (such as form and report generators) and data are readily available to rapidly build working systems

The iterative analysis- design- code- test cycle

• analyze • design • code • test

eXtreme programing planning game:

• exploration: business write a story card; development provides an estimate • commitment: business sorts stories by nessectiy; development sorts stories by risk; business chooses stories for next release • Steering: business reviews process; business and development adjust plan

Deliverables for requirements determination

• from interviews and observations o interview transcripts , observation notes and meeting minutes • From existing written documents o mission and strategy statements, business forms, procedure manuals, job descriptions, training manuals • From computerized sources o joint application design session results, case repositories

Prototyping methodology:

• identify problem • develop prototype • Implement and use prototype • convert to operational system • revise and enhance prototype

Traditional methods for determining requirements:

• interviewing individuals • interviewing groups • observing workers • studying business documents

Requirements determination

• planning • analysis • design • implementation • maintenance

User involvement with prototyping

- Experimenting with the prototype - Giving open reactions to the prototype - Suggesting additions or deletions

Problems with the SDLC

- Extended time required to go through DLC - User requirements change over time

Four types of prototyping

- Patched-up - Nonoperational - First-of-a-series - Selected features

Stressing the user interface

- Prototype is to get users to further articulate their information requirements. - They should be able to see how the prototype will enable them to accomplish their tasks. - The user interface must be well developed enough to enable users to pick up the system quickly - Online, interactive systems using GUI interfaces are ideally suited for prototypes.

Rules for when to stop decomposing your DFD

- When you have reduced each process to a single decision - When each data store represents data about a single entity - When the system user does not care to see any more detail - When every data flow does not need to be split further to show that different data are handled in various ways - When you believe that you have shown each business form or transaction When you believe a separate process is shown of each choice on all lowest-menu options

Prototype Guidelines

- Working in manageable modules - Build the prototype rapidly - Modify prototype in successive iterations - Stress the user interface

Design Models

-is a model building activity -formality of the project will dictate the type, complexity, and depths of the models

Describe the process of normalization

-process used to improve the design of relational databases -From a lower to a higher normal form, these conditions are increasingly stricter and leave less possibility for redundant data

User Interface

-to the user, user interface IS the system -has large impact on user productivity -includes both analysis and design tasks

Managers.

. Managers of the work groups who use the system in question provide insight into new organizational directions, motivations for and organizational impacts of systems, and support for requirements determined during the JAD.

Scrum methodology

1) Product backlog, in which a list is derived from product specifications. 2) Sprint backlog, a dynamically changing list of tasks to be completed in the next sprint. 3) Sprint, a 30-day period in which the development tram transforms the backlog into software that can be demonstrated. 4) Daily scrum, a brief meeting in which communication is the number-one rule. 5) Demo, working software that can be demonstrated to the customer.

Agile principles

1) Satisfy the customer through delivery of working software. 2) Embrace change, even if introduced late in development. 3) Continue to deliver functioning software incrementally and frequently. 4) Encourage customers and analysts to work together daily. 5) Trust motivated individuals to get the job done. 6) Promote face-to-face conversation. 7) Concentrate on getting software to work. 8) Encourage continuous, regular, and sustainable development. 9) Adopt agility with attention to mindful design. 10) Support self-organizing teams. 11) Provide rapid feedback. 12) Encourage quality. 13) Review and adjust behavior occasionally. 14) Adopt simplicity.

6 phases of system analysis and design (systems life cycle)

1) preliminary investigation 2) systems analysis 3) systems design 4) systems development 5) systems implementation 6) systems maintenance

Guidelines for DFD Completeness

1. Completeness 2. Consistency 3. Timing considerations 4. The iterative nature of drawing DFDs 5. Drawing Primitive DFDs

a key task in defining security controls is?

1. Determining which operating system security features will be enabled 2. How they will be configured.

What are the two primary objectives of security controls?

1. Maintain a stable, functioning operating environment for users and application systems (most common security control is firewall) 2. Protect Information and transactions during transmission across insecure environments such as public wireless networks and the internet

Rules for constructing decision tables

1. Name the conditions and the values each condition can assume. 2. Name all possible actions that can occur 3. List all possible rules. 4. Define the actions for each rule. 5. Simplify the decision table.

Significant problem with Symmetric Key Encryption?

1. The sender and receiver use the same key, which must be created and shared securely 2. Security is compromised if the key is transmitted over the same channel as messages encrypted with the key 3. Sharing a key among many users increases the possibility of key theft

List at least three examples of application components

1. Web Sites 2. Java 3. C#

The 80/20 Rule

20 percent of project work consumes 80 percent of time and resources - Project Managers know that 20 percent of the work (the first 10 percent and the last 10 percent) consume 80 percent of your time and resources.

D) all of the above

70) Which of the following documents are useful in understanding possible future system requirements? A) written work procedures B) documents that describe the current information system C) reports generated by current systems D) all of the above

D) all of the above

71) The analysis of documents can help you identify: A) problems with existing systems B) special information processing circumstances that occur irregularly and may not be identified by any other requirements C) the reason why current systems are designed the way they are D) all of the above

Formal systems

: official documented way to do tasks

Close ended questions:

: questions in interviews that ask those responding to choose from among a set of specified responses

Context Diagram

A DFD of the scope of an organizational system that shows they system boundaries, external entities that interact with the system, and the major information that flows between the entities and the system.

A) level-3 diagram

A DFD that is a result of three nested decompositions of a series of subprocesses from a process on a level-0 diagram defines a: A) level-3 diagram B) level-1 diagram C) level-2 diagram D) primitive diagram

D) level-n diagram

A DFD that is the result of n nested decompositions from a process on a level-0 diagram, is called: A) primitive diagram B) level-0 diagram C) context diagram D) level-n diagram

Level-n Diagram

A DFD that is the result of n nested decompositions of a series of sub-processes from a process on a level-0 diagram.

state machine

A UML diagram that shows the life of an object in states and transitions is called a __________.​

Protection from variations

A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?

controller

A ____ class acts as a switchboard between the view layer and the domain layer.

digital certificate

A ____ is an institution's name and public key, which is encrypted and certified by a third party.

digital certificate

A ____ is an institution's name and public key, which is encrypted and certified by a third party.​

controller

A ______ class is a class that mediates between the outside world and the internal system classes. It often can be considered a switchboard.

integrity

A ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

access

A ______ control restricts which persons or programs can add, modify or view information.

data access

A _______ ______ class is a class that is used to retrieve data from a database.

persistent

A _______ class is one where its objects exist after the system is turned off.

stereotype

A ________ is a way of categorizing a model element (particularly a class definition). It is usually denoted with guillemets.

access control list

A ____________________ is the list of users who have rights to access the system and data.

access control list

A ____________________ is the list of users who have rights to access the system and data.​

Tangible benefit

A benefit derived from the creation of an information system that can be measured in dollars and with certianty

intangible benefit

A benefit derived from the creation of an information system that cannot be easily measured in dollars or with certainty

True

A big part of describing the environment is identifying and defining all the types of computing devices that will be required.​

B) has only inputs

A black hole is one that: A) has only inputs B) has only outputs C) has not been exploded to show enough detail D) has insufficient inputs to produce the associated processes

object

A box in a system sequence diagram refers to a what?​

CRC cards

A brainstorming technique for designing interactions in use cases by assigning responsibilities and collaborations for classes is called _______ ______ .

B) identifier

A candidate key that has been selected as the unique, identifying characteristic for an entity type is called a(n): A) attribute B) identifier C) secondary key D) gerund

postcondition

A certain set of values or statuses that must exist after a use case completes its processing is called a _______.​

precondition

A certain set of values or statuses that must exist before a use case begins is called a _______.

True

A class level attribute applies to all instances of a class.

object responsibility

A class named SaleItem which has methods to calculate its own price is said to have good

True

A class of objects is equivalent to a set of objects.​

concrete class

A class that can be instantiated with objects of its type being created is called a ______ _____.

abstract class

A class that can never have objects of its type created is called a ______ ______

very low

A class that is responsible for accessing both the Internet and a database has ____ cohesion.

association

A class that represents a many-to-many association between two other classes is called a ____ class.​

A) entity type

A collection of entities that share common properties or characteristics defines: A) entity type B) entity instance C) entity occurrence D) entity collection

Agile modeling

A collection of innovative, user-centered approaches to system development.

encryption algorithm

A complex mathematical transformation that encrypts or decrypts binary data

True

A composite object only exist as part of a whole-part relationship.​

C) data store

A computer-based file containing employee information is represented on a data flow diagram as a: A) data flow B) source C) data store D) process

cardinality

A concept that describes how instances of one entity relate to instances of another entity.

Cardinality

A concept that describes how instances of one entity relate to instances of another entity. Described in entity-relationship diagrams by notation that indicates combinations that include zero or one-to-many, one-to-one, and many-to-many.

A) user rule

A concise statement of the business rule to be enforced by the triggering operation refers to: A) user rule B) condition C) action D) event

state

A condition during an object's life when it satisfies some criterion is called a ______.​

A) extended entry

A condition that has more than two values is a(n): A) extended entry B) simple entry C) complex entry D) limited entry

value limit

A control that checks the value of a field to ensure that it is within the correct range is a _______ control.​

security

A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.

security

A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.​

Pair programming

A core practice of the agile approach in which two programmers who choose to work together both do programming, run tests, and talk to one another about ways to efficiently and effectively get the job done.

one-time cost

A cost associated with a project start-up and development or system start-up

Tangible cost

A cost associated with an information system that can be measured in dollars and with certainty

Intangible cost

A cost associated with an information system that cannot be easily measured in terms of dollars or with certainty

Recurring cost

A cost resulting from the ongoing evolution and use of a system

dependency

A dashed arrow represents a _______ relationship in a package diagram.

C) level-0 diagram

A data flow diagram that represents a system's major processes, data flows, and data stores at a high level of detail refers to: A) context diagram B) level-1 diagram C) level-0 diagram D) level-00 diagram

A) statements

A decision table does not include: A) statements B) condition stubs C) action stubs D) rules

B

A decision table is simplified by: A) removing extended entries B) removing any rules with impossible actions C) removing simple entries D) removing any rules with static actions

use case description

A description in UML that documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks required for successful completion, and other key descriptions and assumptions.

attribute

A descriptive piece of information about a thing or object is called a _______.​

object responsibility

A design principle in which objects are responsible for carrying out system processing is called ______ ______.

(Fraud Triangle) Motivation

A desire or need for the results of the fraud. Money is the usual motivation, although a desire for status or power or even the need to be a "team player" may be contributing factors

class diagram

A detailed view of a single use case, showing the classes that participate in the use case and documenting the relationship among the classes.

C) entity-relationship model

A detailed, logical representation of the entities, associations, and data elements for an organization or business area defines: A) entity-relationship diagram B) conceptual model C) entity-relationship model D) data flow diagram

Cowboy Coding

A developer who jumps into writing software without carefully thinking it through ends up with errors, patches, and systems that are unreliable and difficult to update

activity diagram

A diagram that resembles a horizontal flowchart that shows the actions and events as they occur.

activity diagram

A diagram that resembles a horizontal flowchart that shows the actions and events as they occur. Activity diagrams show the order in which actions take place and identify the outcome.

system sequence diagram

A diagram that shows the messages between an actor and the system is called a _______.

with the adapter pattern

A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______

Systems Request

A document describing business reasons for project and system's expected value. Lists project's key elements: Project sponsor,Business need, Business requirements, Business value, Special issues or constraints

Project Scope Statement

A document prepared for the customer that describes what the project will deliver and outlines generally at a high level all work required to complete the project

semantic net

A drawing which shows individual objects and their links with other objects, and which is used to help understand the problem domain classes is called a _______ .​

Nominal Group Technique (NGT)

A facilitated Process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator.

D) nominal group technique

A facilitated process that supports idea generation by groups where at the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator best describes: A) affinity clustering B) requirements structuring C) group interviews D) nominal group technique

Nominal Group Technique (NGT)

A facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator

Nominal Group technique

A facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator.

Nominal Group Technique (NGT)

A facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas. The ideas are then pooled under the guidance of a trained facilitator

D) data store

A file folder containing orders is represented on a data flow diagram as a: A) process B) source C) data flow D) data store

Pubic Key Encryption

A form of asymmetric key encryption that uses a public key for encryption and a private key for decryption

Data Model

A formal way of representing the data that are used and created by a business system Shows the people, places and things about which data is captured and the relationships among them.

Subclass

A further division of objects in a class. Subclasses are more specific categories within a class.

subclass

A further division of objects in a class. ___________ are more specific categories within a class.

Top-down planning

A generic information systems planning methodology that attempts to gain a broad understanding of the information systems needs for the entire organization. Projects identified by top management or by a diverse steering committee.

Bottom-up planning

A generic information systems planning methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunity. Project initiatives stemming from managers, business units, or the development group

False

A good way to describe a use case scenario is with a state chart.

the CRUD technique

A good way to ensure that all the use cases have been identified is through _______________.​

Data-flow diagram (DFD)

A graphic that illustrates the movement of data between external entities and the processes and data stores within a system

message

A labeled arrow between lifelines on a sequence diagram is called a _______________.

Internet

A large, world-wide network of networks that use a common protocol to communicate with each other

Access Control List

A list attached or linked to a specific resource that describes users or user groups and the nature of permitted access

True

A loop frame and an asterisk mean the same thing in a sequence diagram.​

True

A loop or repeating message or messages in a sequence diagram is depicted by a rectangle box.

analysis is understanding, design is solution

A major comparison between analysis and design can be stated as:

analysis is understanding, design is solution

A major comparison between analysis and design can be stated as:​

Baseline Project Plan

A major outcome and deliverable from the project initiation and planning phase that contains the best estimate of a project's scope, benefits, costs, risks, and resource requirements

Working in manageable modules

A manageable module is one that allows users to interact with its key features but can be built separately from other system modules. Module features that are deemed less important are purposely left out of the initial prototype.

Decision table

A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting action

C) decision table

A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions, defines a: A) structure chart B) state transition diagram C) decision table D) sequence diagram

Transport Layer Security (TLS)

A method for secure message transmission over the Internet.

B) has only outputs

A miracle process is one that: A) has only inputs B) has only outputs C) cannot be exploded further D) has insufficient inputs to produce the associated processes

fraud triangle

A model of fraud that states that opportunity, motivation, and rationalization must all exist for a fraud to occur

fraud triangle

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.​

B) decision table

A modeling technique that allows you to represent a set of conditions and the actions that follow from them in a tabular format best describes: A) data flow diagram B) decision table C) flowchart D) Structured English

superclass

A more generalized category to which objects may belong

Superclass

A more generalized category to which objects may belong (e.g., a NOVEL class might belong to a superclass called BOOK).

A) attribute

A named property or characteristic of an entity that is of interest to the organization defines: A) attribute B) relationship C) instance D) gerund

Nonoperational prototype

A nonworking scale model that is set up to test certain aspects of the design.

True

A package diagram is useful to document the various subsystems in a system.

singleton

A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.

Walkthrough

A peer group review of any product created during the systems development process

Entity

A person, place, event, or thing about which data is collected Must be multiple occurrences to be an entity

D) entity

A person, place, object, event, or concept in the user environment about which the organization wishes to maintain data refers to a(n): A) attribute B) data element C) relationship D) entity

ERD

A picture showing the information created, stored, and used by a business system. Entities generally represent similar kinds of information Lines drawn between entities show relationships among the data High level business rules are also shown

attribute

A piece of information about a particular object is called a _______.

C) verb phrase label

A process has a: A) pronoun label B) adjective label C) verb phrase label D) noun phrase label

Technical feasibilty

A process of assessing the development organization's ability to construct a proposed system

Economic feasibility

A process of identifying the financial benefits and costs associated with a development project

Aggregation

A relationship between a "sports team" and the players, coaches, and sponsor would be described as what kind of relationship?​

mandatory

A relationship that has a cardinality constraint of one or more is a _______ relationship.

B) associative entity

A relationship that the data modeler chooses to model as an entity type best defines: A) recursive relationship B) associative entity C) domain D) complex relationship

D) enables you to work backwards from the information on a report to the data that must have been necessary to generate them

A report: A) indicates the inputs required for the new system B) describes how a particular job or task is performed, including data and information that are used and created in the process of performing the job C) indicates what data flow in or out of a system and which are necessary for the system to function D) enables you to work backwards from the information on a report to the data that must have been necessary to generate them

activation lifeline

A representation of a period during which a method of an object is alive and executing is called its ______ ______.

True

A return value in an interaction diagram is often a named object.

Remote Wipe

A security measure that automatically deletes sensitive data from a portable device when unauthorized accesses are attempted

True

A semantic net illustrates individual objects within a class diagram.​

path

A sequential set of connected states and transitions is called a _______________.​

Objective Statements

A series of statements that express an organization's qualitative and quantitative goals for reaching a desired future position

Repeatable Processes

A set of tasks and processes have been defined well enough to allow one to predict project results with reasonable accuracy; however, no method of forecasting improvements of making trade-offs is implemented.

C) Repeating Group

A set of two or more multivalued attributes that are logically related defines: A) relationship B) gerund C) repeating group D) class

C) ternary relationship

A simultaneous relationship among instances of three entity types is a: A) unary relationship B) binary relationship C) ternary relationship D) multiple occurrence

attribute

A single characteristic or fact about an entity. An ________ , or field, is the smallest piece of data that has meaning within an information system.

Attribute

A single characteristic or fact about an entity. An attribute, or field, is the smallest piece of data that has meaning within an information system. For example, a Social Security number or company name could be examples of an attribute. In object-oriented analysis, an attribute is part of a class diagram that describes the characteristics of objects in the class. Also known as a data element.

A) entity instance

A single occurrence of an entity type defines: A) entity instance B) entity appearance C) attribute D) data element

Instance

A specific member of a class.

instance

A specific member of a class.

D) source/sink

A square on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

Systems Development Methodology

A standard process followed in an organization to conduct all the steps necessary to analyze, design, implement and maintain information systems. To develop and support information systems

Secure Sockets Layer (SSL)

A standard set of methods and protocols that address authentication, authorization, privacy, and integrity

False

A state-machine diagram is usually developed for every class in the problem domain class diagram.​

Mission Statement

A statement that makes it clear what business a company is in

Design of the user interface

A storyboard is useful for what?​

Incremental commitment

A strategy in systems analysis and design in which the project is reviewed after each phase and continuation of the project is re-justified

Joint Application Design (JAD)

A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements

Joint Application Design (JAD)

A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review systems requirements.

Joint Application Design (JAD)

A structured process in which users, managers, and analysts works together for several days in a series of intensive meetings to specify or review systems requirements

C) subtype

A subgrouping of the entities in an entity type that is meaningful to the organization and that shares common attributes or relationships distinct from other subgroupings best defines: A) child node B) disjoined entity C) subtype D) supertype

True

A superclass only exists as part of a generalization/specialization.​

B) source

A supplier of auto parts to our company is represented on a data flow diagram as a: A) process B) source C) data flow D) data store

multiplicity

A synonym for cardinality (used with UML class diagrams) is ____.​

Patched-up prototype

A system that works but is patched up or patched together; a working model that has all the features but is inefficient.

Embracing change

A systems analyst needs to have the ability and methods to create dynamic, context-sensitive, scalable, and evolutionary applications. Agile modeling is therefore a change-embracing method.

Extreme programming (XP)

A systems development approach that accepts what we know as good systems development practices and takes them to the extreme. The genesis of agile approaches.

CRUD

A technique that is used to validate the set of use cases against identified classes is called __________ technique.

brainstorming technique

A technique to identify problem domain objects in which developers and users work together in an open group setting is called the _______ .​

association

A term in UML that describes a naturally occurring relationship between specific things is called a _______.​

use case description

A textual model that describes the processing details of a use case is called a ________.

False

A true/false condition on a message indicates the condition of the return value of the message, i.e. whether the message was successful or not.​

False

A true/false condition on a sequence diagram indicates whether the message can be processed or not.​

Break-even analysis

A type of cost-benefit analysis to identify at what point (if ever) benefits equals cost

package

A type of diagram that is used to define groups of classes as a subsystem is called a _______________ diagram.

Communication diagram

A type of interaction diagram that does not have activation lifelines is called a ____________ ____________ .

Communication diagram

A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a _______ _______ .

sequence

A type of interaction diagram that emphasizes the order of the messages between objects for a specific use case is called a ________ diagram.

Inheritance

A type of object relationship. Inheritance enables an object to derive one or more of its attributes from another object (e.g., an INSTRUCTOR object may inherit many traits from the EMPLOYEE object, such as hire date).

inheritance

A type of object relationship. ________________ enables an object to derive one or more of its attributes from another object

composition

A type of relationship where between classes where the objects in one class are a part of the objects in another class AND they can only exist as part of the totality.

aggregation

A type of relationship where between classes where the objects in one class are a part of the objects in another class BUT they can also exist as separate objects alone.​

scenario

A unique set of internal activities within a use case which represents a unique path through the use case is called a _______.

privileged user

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.

privileged user

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​

On-site customer

A user who is an expert in the business aspect of the systems development work is on-site during the development process. This person is integral to the process, writes user stories, communicates to team members, helps prioritize and balance the long-term business needs, and makes decisions about which feature should be tackled first.

B) describes how a particular job or task is performed, including data and information that are used and created in the process of performing the job

A written work procedure: A) indicates the job an analyst will need to perform on a given project B) describes how a particular job or task is performed, including data and information that are used and created in the process of performing the job C) indicates what data flow in or out of a system and which are necessary for the system to function D) enables you to work backwards from the information on a report to the necessary data

Security Controls

Access Controls Data Encryption Digital Signatures and Certificates Secure Transactions

First iteration

According to an Agile iterative development process in which iteration would design activities normally start?

First iteration

According to an Agile iterative development process in which iteration would design activities normally start?​

False

Activity diagrams are not helpful in developing system sequence diagrams (SSDs).

False

Activity diagrams are not helpful when the flow of activities is too complex.​

System Sequence Diagrams

Activity diagrams are useful in the development of ______________.

False

Activity diagrams cannot be used to describe processes that involve automated system activities.​

B) event

All business processes begin and end with a(n): A) starting and termination points B) event C) activity D) gateway

C) purchased models are very specific

All of the following are benefits of database patterns and packaged data models EXCEPT: A) purchased models are proven from extensive experience B) systems analysis is facilitated C) purchased models are very specific D) purchased models anticipate future needs

A) decision

All of the following are symbols used in business process modeling EXCEPT: A) decision B) gateway C) event D) activity

Rapid Prototyping

Allows an analyst to gain insight about the remainder of the project; showing users early in the process how parts of the system actually perform guards against overcommitting resources to a project that may eventually become unworkable.

Manageable Module

Allows users to interact with its key features but can be built separately from other system modules; module features that are deemed less important are purposely left out of the initial prototype.

C) analysis

An E-R model with attributes is prepared during: A) design B) project identification and selection C) analysis D) project initiation and planning

True

An Opt frame and a true/false condition on a message serve essentially the same purpose.​

False

An Opt frame and an Alt frame do essentially the same thing.​

False

An abstract class is used to describe a "thing" that is abstract, i.e. not tangible.

True

An activity diagram and the flow of activities in a fully developed use case description serve the same purpose.​

True

An actor is always outside of the automation boundary.​

state

An adjective that describes an object's current status

State

An adjective that describes an object's current status (e.g., a student could be a CURRENT, FUTURE, or PAST student).

unit of software

An application component can be thought of as a __________

unit of software

An application component can be thought of as a __________.​

B) data flow

An arrow on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

message

An arrow on a system sequence diagram is used to depict a what?​

A) triggering operation

An assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete is: A) triggering operation B) entity integrity C) referential integrity constraints D) domains

B) relationship

An association between the instances of one or more entity types that is of interest to the organization best defines: A) occurrence B) relationship C) coupling D) cardinality

many to many

An association class is frequently required for what kind of relationship?

association class

An association that is also treated as a class is called a _______.

C) candidate key

An attribute (or combination of attributes) that uniquely identifies each instance of an entity type defines: A) data element occurrence B) trigger C) candidate key D) gerund

key

An attribute for an object which can be used to uniquely identify that object is called a _______.​

compound attribute

An attribute that contains a collection of related attributes is called a _______.​

B) multivalued attribute

An attribute that may take on more than one value for each entity instance is referred to as a: A) gerund B) multivalued attribute C) nonexclusive attribute D) supertype

key attribute

An attribute whose value uniquely identifies an object is called a _______.​

Prototype

An early approximation of a final system or product.

Asymmetric Key Encryption

An encryption method that uses different keys to encrypt and decrypt the data

Symmetric Key Encryption

An encryption method that uses the same key to encrypt and decrypt the data

social security number

An example of an attribute of an object might be _______.​

(Fraud Triangle) Rationalization

An excuse for committing the fraud or an intention to "undo" the fraud in the future. ex. An employee might falsify financial reports to stave off bankruptcy, thus enabling fellow workers to keep their jobs. Or an employee might steal money to pay a personal bill / debt, with the intention of paying back the money later.

A) dash (-)

An indifferent condition is represented by a(n): A) dash (-) B) asterisk (*) C) exclamation point (!) D) pound sign (#)

boundary

An input window class is an example of a ____ design class type.

Digital Certificate

An institutions name and public key encrypted and certified by a third party

field combination

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.

field combination

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.​

False

An interaction diagram is a subclass of a sequence diagram.

Hypertext Transfer Protocol Secure (HTTPS)

An internet standard for secure transmitting Web pages. All modern Web browsers and servers support HTTPS.

Prototyping

An iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between an analyst and users.

Protoyping

An iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between an analyst and users.

Prototyping

An iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between analyst and users

Message

An object-oriented command that tells an object to perform a certain method.

message

An object-oriented command that tells an object to perform a certain method.

objects

An object-oriented program consists of a set of computing ______.

False

An object-oriented program consists of a set of object classes that work together to process an input message.

True

An objective of security controls is to maintain a stable operating environment for users.

Corporate Strategic Planning

An ongoing process that defines the mission, objectives, and strategies of an organization

Information Systems Planning

An orderly means of assessing the information needs of an organization and defining the systems, databases, and technologies that will best satisfy those needs

Digital Certificate

An organizations name and public that is encrypted and certified by an authorized third party

True

An oval indicates an embedded use case inside of an activity diagram.​

Objective of system analysis

Analysis involves decomposition. Analysts then organize, structure, and document the problem domain knowledge by building requirements models Requires extensive user involvement to explain the requirements and to verify that the models are accurate

What major skills does a systems analyst need?

Analytical skills, technical skills, management skills, interpersonal skills

Sponsor:

As a major undertaking due to its expense, a JAD must be sponsored by someone at a relatively high level in the company. If the sponsor attends any sessions, it is usually only at the very beginning or the end.

Relationships

Associations between entities The first entity in the relationship is the parent entity; the second entity in the relationship is the child entity Relationships should have active verb names Relationships go in both directions

C) 16

Assume the first condition has four values; the second condition has two values; the third condition has two values. How many rules will there be? A) 8 B) 7 C) 16 D) 24

B) 12

Assume the first condition has two values; the second condition has two values; the third condition has three values. How many rules will there be? A) 7 B) 12 C) 6 D) 11

D) 18

Assume we have three conditions. Condition one has two values; condition two has three values; condition three has three values. How many rules are needed? A) 8 B) 6 C) 5 D) 18

____ are characteristics that describe the object.

Attributes

False

Attributes are part of a UML class diagram, but not included in ERD diagrams.

True

Attributes can sometimes be combined together to form a larger group.​

Key-value data stores essentially provide a distributed index (primary key) to where a ___ is stored.

BLOB (binary, large object)

C) identifying selection criteria

Basic procedures for constructing a decision table do not include: A) listing all possible rules B) naming the conditions and the values each condition can assume C) identifying selection criteria D) simplifying the decision table

Designing security and controls impacts the design of which other elements?

Because they are embedded in all other design activities, securities and controls are important parts of activities such as designing a user interface, a database, or application components.

IS staff:

Besides systems analysts, other information systems (IS) staff, such as programmers, database analysts, IS planners, and data center personnel, may attend to learn from the discussion and possibly to contribute their ideas on the technical feasibility of proposed ideas or on technical limitations of current systems.

Entity

Box, is a person, place, or thing; has a singular name spelled in all capital letter; has an identifier; should contain more than one instance of data

What are the two ways to acquire software?

Build it or Buy it

Design the application components

Build or buy questions are usually addressed during which design activity?

Selected-features prototype

Building an operational model that includes some, but not all, of the features that the final system will have.

Selected Features Prototype

Building an operational model that includes some, but not all, of the features that the final system will have. - Not all essential features are included - Built in modules - Part of the actual system

Explain the rules for creating entity relationship diagrams

Business Rules: constraints that are followed when the system is in place -Certain entities must exist before relationships are created -Certain entity is optional for relation to any entity (optional) -How many can be related (only one or more than one) (how many)

What drives projects?

Business needs

What are some reasons to initiate planning phase of the SDLC

Business opportunity, requests to deal with problems in current procedures, the desire to perform additional tasks, or the realization that information technology could be used to capitalize on an existing opportunity Corporate objectives New products...additional revenue Reduce costs Consolidation from mergers Government regulations Changes in business practices Vendor changes Technology changes

A) decouples the processe

By placing a data store between two processes, this: A) decouples the processes B) enables store and forward capabilities C) enhances the flow of data between the processes D) structures the processes

Create, Read, Update, Delete

CRUD stands for _______________.​

D) process

Calculating an employee's salary is represented on a data flow diagram as a: A) data flow B) source C) data store D) process

Independent Entity

Can exist without the help of another entity Identifiers created from the entity's own attributes Attributes from other entities are not needed to uniquely identify instances of these entities

Advantages of Network Diagrams

Can represent how completion times vary for activities. Composed of circles or rectangles representing activities and connecting arrows showing required work flows. Has the ability to use probability estimates in determining critical paths and deadlines

False

Cohesion is a measure of how well the system "hangs together" by having strong connections between classes.

sequence numbers

Communication diagrams indicates the order of the messages with ____.

Agile values

Communication, simplicity, feedback, and courage.

False

Completeness control is an integrity control that identifies when a value in a field is too large or too small.​

C) analysis

Conceptual data modeling is typically done in parallel with other requirements analysis and structuring steps during: A) logical design B) physical design C) analysis D) implementation

C) the development group is small

Continual user involvement works best when: A) the number of end users is large B) the number of end users is small C) the development group is small D) the development group is large

Access Control

Control that limits a user's ability to access resources, such as servers, files, web pages, application programs, and database tables

Value Limit Controls

Controls that check numeric data input to ensure that the value is reasonable

Output Controls

Controls that ensure output arrives at the proper destination and is accurate, current, and complete

Completeness Controls

Controls that ensure that all required data values describing an object or transaction are present

Data Validation Controls

Controls that ensure that numeric fields that contain codes or identifiers are correct

Input Controls

Controls that prevent invalid or erroneous data from entering the system

Security Controls

Controls that protect the assets of an organization from all threats with a primary focus on external threats

Integrity Controls

Controls that reject invalid data inputs, prevent unauthorized data outputs, and protect data and programs against accidental or malicious tampering

Field combination controls

Controls that review combinations of data inputs to ensure the correct data are entered

How do you evaluate criteria for off-the-shelf software packages?

Cost, functionality, vendor support, vendor viability, flexibility, documentation, response time, ease of installation

False

Cowboy coding is one of the newer techniques programming, often used with Agile techniques.

First-of-a-Series Prototype

Creating a pilot; completely operational; useful when many installations of the same information system are planned. A full-scale prototype is installed in one or two locations first, and if successful, duplicates are installed at all locations based on customer usage patterns and other key factors.

Relational Database Management Systems (RDBMS)

Current technology frequently use _________?

Level-0 Diagram

DFD that represents a system's major processes, data flows, and data stores at a high level of detail.

What is analyzed via methodologies?

Data (input/capture and storage) Information (output/presentation) Data flow (movement/transfer) Processing logic (manipulation/analysis)

contain Structure Query Language (SQL) statements

Data access layer classes should ____.

B) data store

Data at rest, which may take the form of many different physical representations, defines: A) source B) data store C) data flow D) process

Data Store

Data at rest, which may take the form of many different physical representations.

A) process models

Data flow diagrams that concentrate on the movement of data between processes are referred to as: A) process models B) data models C) flow models D) flow charts

D) data flow

Data in motion, moving from one place in a system to another, defines: A) data store B) process C) source D) data flow

Which two models need to be balanced

Data models should balance with process models

False

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.

False

Database design often requires someone with analysis skills since many decisions must be made about the field sizes and characteristics.

method

Defines specific tasks that an object must perform.

Method

Defines specific tasks that an object must perform. Describes what and how an object does something.

False

Defining the technology architecture is part of the activity to Design the application components.​

False

Dependency relationships cannot exist between classes within packages.

object model

Describes objects, which combine data and processes.

object model

Describes objects, which combine data and processes. Object models are the end product of object-oriented analysis.

Objective of system design

Design is much more oriented towards technical issues, and therefore require less user involvement and more involvement by other systems professionals Output of design activities is a set of diagrams and documents that models various aspects of the solution system

Why is the singular form of the term 'user interface' usually a misnomer?

Designing a single user interface is now the exception, not the norm. Ever-improving technology expands and changes user-interface requirements. A decade ago, user-interface design was concerned primarily with simplifying the presentation of information on desktop computer monitors and minimizing task-related keystrokes and mouse clicks. In the modern world, designers must deal with multiple screens ranging from phones to large monitor displays.

True

Designing a single user interface is now the exception, not the norm.​

interaction

Developing a ____ diagram is a multistep process of determining which objects work together and how they work together.

D) all of the above

Drawbacks to prototyping include: A) a tendency to avoid creating formal documentation of systems requirements that can then make the system more difficult to develop into a fully working system B) prototypes becoming very idiosyncratic to the initial user and difficult to diffuse or adapt to other potential users C) prototypes being built as stand-alone systems D) all of the above

True

During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

Answer: impertinence

During requirements determination, the systems analyst characteristic that says you should question everything is ________.

A) an E-R model represents conceptual data requirements for a particular system

During requirements structuring: A) an E-R model represents conceptual data requirements for a particular system B) the conceptual E-R data model is refined before it is translated into a logical format from which database definition and physical database design are done C) an enterprise-wide data model with very broad categories of data and little detail is prepared D) a specific E-R model is built to help explain the scope of a particular systems analysis and design effort

False

Each concurrent path in a state-machine diagram will contain multiple states.​

Business-to-business

Electronic commerce between business partners such as suppliers and intermediaries

Business-to-consumer

Electronic commerce between businesses and consumers

Business-to-employee

Electronic commerce between businesses and their employees

relationships

Enable objects to communicate and interact as they perform the business functions and transactions required by a system.

Relationships

Enable objects to communicate and interact as they perform the business functions and transactions required by a system. Relationships describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses.

True

Every state-machine diagram must have both origin states and destination states.

Types of prototypes

Evolutionary: you begin modeling parts of the target system and if the system is successful than you build the rest of the system around it Throwaway: doesn't preserve the prototype that has been developed; the prototype is never used in the actually system

Intersection Entity

Exists in order to capture some information about the relationship that exists between two other entities.

A master file holds information temporarily so that it can be used to update other master files.

False

In terms of storage space, the most efficient tables in a relational database have redundant data and many null values.

False

It is likely easier today to find expertise in OODBMS than in RDBMS.

False

Mapping from the problem domain to the data management objects in an RDBMS format is a straightforward one-to-one mapping.

False

The Object Relational DBMS has all advantages from both the Relational DBMS and the Object-Oriented DBMS.

False

The two primary dimensions to optimize a relational database are storage efficiency and future needs.

False

First-of-a-series prototype

First full-scale model of a system, often called a pilot; completely operational.

B) underlined on an E-R diagram

For each entity, the name of the identifier is: A) identified by using a double-lined ellipse B) underlined on an E-R diagram C) bold on an E-R diagram D) written in all capital letters on an E-R diagram

status condition

For real-world objects the state of an object is the same as its _______.

C) indicate what data flow in or out of a system and which are necessary for the system to function

Forms are important for understanding a business because they: A) indicate the correct sequencing of tasks B) describe how particular tasks are performed C) indicate what data flow in or out of a system and which are necessary for the system to function D) enable you to work backwards from the information on a report to the necessary data

C) when they contain actual organizational data

Forms are most useful: A) when they do not contain any data B) during the initial planning stages C) when they contain actual organizational data D) during the design stage

Differences between Gantt chart and Network Diagram

Gantt charts visually show the duration of tasks, whereas a network diagram visually shoes the sequence dependencies between tasks. Gantt charts visually show the time overlap of tasks, whereas a network diagram does not show time overlap but does show which tasks could be done in parallel. Some Gantt charts can visually show slack time available within an earliest start and latest finish duration. A network diagram shows this by data within activity rectangles

parameter-list

Given the following partial syntax for a message, the underline represents what part of the message? "sequence-number: return-value := message-name (_______)"

Customer to Order

Given two classes, customer and order, which class would probably have navigational visibility to which class?

Assume simplicity

Good design is often simple.

D) seeking a variety of perspectives from the interviews

Good interview guidelines consist of: A) phrasing the question to illicit the correct response B) typing your notes within two weeks of the interview C) establishing expectation levels about the new system D) seeking a variety of perspectives from the interviews

C) process modeling

Graphically representing the functions, or processes, which capture, manipulate, store, and distribute data between a system and its environment and between components within a system refers to: A) data modeling B) flow charting C) process modeling D) transition modeling

Process Modeling

Graphically representing the processes that capture, manipulate, store, and distribute data between a system and its environment and among components within a system

C) numbering

Guidelines for drawing DFDs include the following except for: A) completeness B) consistency C) numbering considerations D) timing considerations

B) violation of consistency

Having a level-1 diagram with no level-0 diagram is an example of a: A) violation of completeness B) violation of consistency C) gap D) structuring violation

​adds complexity

High coupling ____ in a system.

Cardinality

How many times it can be related to another entity

(Design Activities: Key Question) Design the database

How will data be captured, structured, and stored for later use by the information system?

Key question for: Design the database

How will the data be captured, structured, and stored for later use by the information system?

(Design Activities: Key Question) Describe the Environment

How will this system interact with other systems and with the organizations existing technologies?

Key Question for Describe the environment?

How will this system interact with other systems and with the organizations existing technologies?

(Design Activities: Key Question) Design the user interface

How will users interact with the information system?

Key questions for: Design the user interface

How will users interact with the information system?

How do you better project management?

Identify manageable tasks (and schedule them) Use formal estimating methods Use well-defined project management processes (includes assessing risks and mitigating them, tracking progress, conducting walkthroughs to find/remove errors, managing expectations and change)

3 steps in Building ERDs

Identify the entities Add attributes and assign identifiers Identify relationships

B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule

If Rules 2, 4, and 6 are indifferent conditions, then: A) Rules 2, 4, and 6 are eliminated from the matrix B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule C) Rules 2, 4, and 6 will result in at least two additional rules being included in the matrix D) Rules 2, 4, and 6 have no impact on the interpretation of the matrix

B) binary relationship

If STUDENT and COURSE participate in a relationship, their relationship is a(n): A) unary relationship B) binary relationship C) ternary relationship D) extraordinary relationship

C) balancing

If a data flow appears on the context diagram and is also represented at level-0, this would be referred to as: A) leveling B) flow conservation C) balancing D) matching

A) appear on the context diagram

If an input from a source appears at level-0, it must: A) appear on the context diagram B) be connected to a data flow C) be connected to a sink D) be connected to a data store

B) multivalued attribute

If each employee can have more than one skill, then SKILL is referred to as a: A) gerund B) multivalued attribute C) nonexclusive attribute D) repeating attribute

C) the minimum cardinality of the relationship is one

If entity B is a mandatory participant, then: A) the minimum cardinality of the relationship is two B) the minimum cardinality of the relationship cannot be defined C) the minimum cardinality of the relationship is one D) the minimum cardinality of the relationship is optional

The message is not sent

If the True/False condition on a message evaluates to false in a sequence diagram, which of the following is correct?​

C) be coupled to each other

If two processes are connected by a data flow, they are said to: A) share the same timing effects B) share the same data C) be coupled to each other D) be strapped to each other

composite

If we modeled a "sale" and the "sale items" with a whole-part relationship, it would best be described as a _______ relationship.​

Order Handler

If you are doing detailed design for the use case Create New Order, which class should receive the first input?

C) complete

If your DFD contains data flows that do not lead anywhere, it is not: A) gap proof B) a primitive diagram C) complete D) consistent

B) call the duplication to the attention of management as an issue to be resolved before system design can proceed

If your analysis of several written procedures reveals a duplication of effort in two jobs, you should: A) indicate that one job be deleted from the new system B) call the duplication to the attention of management as an issue to be resolved before system design can proceed C) justify the duplication of effort D) restructure the tasks so that the duplication is removed

D) All of the above are correct.

In BPR, which of the following questions are used to identify activities for radical change? A) How important is the activity to delivering the outcome? B) How feasible is changing the activity? C) How dysfunctional is the activity? D) All of the above are correct.

False

In UML a zero to many multiplicity constraint is shown with a "O" and crows feet on the line.​

multiplicity

In UML notation for object-oriented approach the term _______ is used instead of cardinality.​

action

In UML terminology in a sequence diagram, a message refers to a _______.​

an optional relationship

In UML the constraint denoted by "0..*" indicates what?

guillemets

In Unified Modeling Language (UML) notation, a stereotype is indicated by ____.

symmetric

In ____________________ encryption, the same key encrypts and decrypts the data.

Indifferent condition

In a decision table, a condition whose value does not affect which actions are taken for two or more rules

A) indifferent condition

In a decision table, a condition whose value does not affect which actions are taken for two or more rules is referred to as a(n): A) indifferent condition B) static condition C) fixed condition D) flexible condition

a solid arrow between the classes, pointing to the visible class

In a design class diagram, navigation visibility is identified by ____.

What objects must exist prior to the use case executes.

In a fully developed use case description normally the preconditions describe what?​

What conditions prevent the system from successfully completing the use case.

In a fully developed use case description the exception conditions represent what?

​The existence of domain model objects.

In a fully developed use case description the postcondition data describes what conditions?

An activity diagram

In a fully developed use case description, the flow of activities is most similar to what?​

abstract

In a generalization/specialization relationship, it would not make sense for a class at the bottom of the hierarchy to be a ______ class.​

generalization/specialization

In a relationship where there are superclasses and subclasses, the relationship is called a _______ relationship.​

A return message

In a sequence diagram a horizontal dashed line represents what?​

verb-noun

In a sequence diagram the message-name is usually given in what format?​

return value

In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter B represents what?

parameter list

In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter D represents what?

lifeline

In a sequence diagram, ___________ is used to represent the time during which the object above it is able to interact with the other objects in the use case.

focus

In a sequence diagram, a ____________ indicates when an object sends or receives a message.

focus

In a sequence diagram, a focus indicates when an object sends or receives a message. It is indicated by a narrow vertical rectangle that covers the lifeline.

Lifeline

In a sequence diagram, a lifeline is used to represent the time during which the object above it is able to interact with the other objects in the use case. An X marks the end of a lifeline

True

In a sequence diagram, a message is considered to be an action that is invoked on the destination object.

perfect memory assumption

In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.

concurrency

In a state machine diagram when an object is in multiple states at the same time it is called _________.​

oval

In a state machine diagram, a state is represented by a _______.

False

In a system sequence diagram a box refers to a class of objects.​

False

In a system sequence diagram the order of the messages is determined by numbering the messages.

action expression

In a transition label in a state machine the syntax is A(B)[C]/D. The D stands for what?

True

In an activity diagram, a separate use case may used as part of the workflow.​

True

In an interaction diagram, messages are sent and received by individual objects, not by classes.​

B) gateway

In business process modeling, a decision point is called a(n): A) activity B) gateway C) terminal D) loop

A) swimlane

In business process modeling, a way to encapsulate a process is called a(n): A) swimlane B) fastlane C) lane D) none of the above

property

In design class notation, the ____ of an attribute is enclosed in curly braces {}.

True

In generalization/specialization the objects in a subclass are always also contained in the parent class.​

child

In inheritance, _________ is the object that derives one or more attributes from another object, called the parent.

parent

In inheritance, __________ is the object from which the other object, the child, derives one or more attributes.

Child

In inheritance, a child is the object that derives one or more attributes from another object, called the parent.

Parent

In inheritance, a parent is the object from which the other object, the child, derives one or more attributes.

True

In order for an object to send a message to another object it must have navigation to that object.

A) data store

In the Gane and Sarson model, a rectangle that is missing its right vertical sides on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

C) process

In the Gane and Sarson model, a rectangle with rounded corners on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

True

In the object-oriented approach to systems development, the flow of information is achieved by sending messages either to and from actors or back and forth between internal objects.​

data entities

In the traditional approach to system development, the system stores information about ____.​

True

In user interface design the detailed screen layouts should be done after the devices have been decided.​

True

In using the CRUD technique, new use cases and new stakeholders may be identified.

Data

Information System requires _______?

Attributes

Information captured about an entity Only those used by the organization should be included in the model Attribute names are nouns Sometimes entity name is added at the beginning of the attribute name for clarity

False

Information for Use Case Descriptions is primarily derived from System Sequence Diagrams.​

classes share some attributes

Inheritance describes a condition between classes where _______.​

Integrity Controls

Input Controls Output Controls Backup and Recovery Fraud Prevention

IP Security (IPSec)

Internet standard for secure transmission of low-level network packets

Electronic Commerce

Internet-based communication to support day-to-day business activities

B) group interviewing

Interviewing several key people at once refers to: A) stakeholder interviewing B) group interviewing C) user interviewing D) strategic interviewing

Incremental change

Introducing many small, gradual changes to a project instead of a few large, rapid changes.

Managed Reuse

Is a more structured, more expensive, mode of managing software reuse. With managed reuse, the development, sharing, and adoption of reusable assets is mandated

Hypertext Transfer Protocol

Is an application protocol for distributed, collaborative, and hypermedia information systems.

-Scope & Size -Programming Language -Build or Buy

Issues involve how to package components including?

True

It is better to have the data access object create a new object when multiple objects may be created.

False

It is just as important to have heavy user involvement during analysis as it is during design.​

Agile Methodologies

Iterative development - Repetition of refining steps Successively closer to goal Evolutionary/adaptive Continuous, self-adapting change simpler state to more complex or better state Focus on people not roles (people are talented and creative, not replaceable parts) example: eXtreme programming - software development approach

-Communication with External Systems -Conforming to an Existing Technology Architecture

Key elements in the environment

Security and controls design

Limiting user access to the system is considered what type of design activity?

Security and controls design

Limiting user access to the system is considered what type of design activity?​

Systems Thinking

Looking at a situation as a system of interacting components: abstracting, decomposing. Then identifying a problem and designing, selecting, and implementing a solution. Then simplifying, re-engineering internals of (i.e., processes) and interactions between components - including interfaces, using cohesion, decoupling

Successive Iterations

Making a prototype modifiable means creating it in modules that are not highly interdependent

Modifying the prototype

Making a prototype modifiable means creating it in modules that are not highly interdependent. Each modification is followed by an evaluation by users.

Systems analysts

Members of the systems analysis team attend the JAD, although their actual participation may be limited. Analysts are there to learn from users and managers, not to run or dominate the process.

True

Message names should be given to indicate the service requested from the destination object.

False

Messages are comprised of five elements, all of which are optional except the method name.

____ resemble verbs that describe what and how an object does something.

Methods

False

Model building is a unique to Systems Analysis.​

Designed Reuse

Most expensive and extensive approach - in addition to mandating reuse and measuring its effectiveness, this approach takes another step of mandating the assets to be designed for reuse as they are being designed for specific applications. Focus more on developing reusable assets then finding existing ones

Facilitated Reuse

Not required to practice reuse but encouraged. Organization makes tools and techniques available that enable the development and sharing of reusable assets

tie the exception condition to a processing step

Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to _______.

D) both A and B

On a data flow diagram, you may: A) repeat data stores B) repeat sources/sinks C) repeat processes D) both A and B

asterisk

On a sequence diagram a short notation that indicates a repeating message is a _______.​

loop frame

On a sequence diagram when multiple messages are included within a repeating loop a _______ is used to document it.​

True

On a sequence diagram, a message represents a service request.​

True

On a sequence diagram, view layer objects send messages to the controller.

[]

On a systems sequence diagram, ____ indicate(s) a true/false condition.​

Flow of activities

On an Activity Diagram the arrows represent what?​

Return value(s)

On an SSD, a dashed arrow usually represents what?

An object

On an SSD, a named rectangular box represents what?​

False

On an activity diagram, the diamond represents an "AND" condition.​

swim lanes

On an activity diagram, what are the vertical rectangles that contain the activity ovals called?

To initiate alternative paths

On an activity diagram, which of the following is NOT a valid use of a synchronization bar?​

C) previously unknown information can result

One advantage of open-ended questions in an interview is: A) a significant amount of time can be devoted to each interviewee B) the interviewee is restricted to providing just a few answers C) previously unknown information can result D) they work well when the answers to the questions are well known

False

One of the disadvantages of UML and object-oriented models is the difficulty of synchronizing the models.​

True

One of the first steps in designing the application components is to divide the software into subsystems.​

Identifier

One or more attributes can serve as the entity identifier, uniquely identifying each entity instance Concatenated identifier consists of several attributes An identifier may be 'artificial,' such as creating an ID number Identifiers may not be developed until the Design Phase

noun technique

One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called the _______.​

brainstorming technique

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.

Types of questions:

Open ended questions: questions in interviews that have no prespecified answers. Close ended questions: questions in interviews that ask those responding to choose from among a set of specified responses Closed-ended questions, like objective questions on an examination, can follow several forms, including the following choices:

False

Package diagrams are used primarily when designing the software classes.

False

Package diagrams are used primarily when designing the software classes.​

Registered Users

People who are authorized to access the system

Unauthorized Users

People who aren't allowed access to any part or function of the system

Privileged Users

People who have access to the source code, executable program, and database structure of the system

SDLC/Prototyping Hybrid Drawbacks

Prematurely shaping a system before the problem or opportunity is thoroughly understood; may result in producing a system that is accepted by specific groups of users but is inadequate for overall system needs.

Plan the Interview

Prepare interviewee: appointment, priming questions Prepare checklist, agenda, and questions • Listen carefully and take notes (record if permitted) • Review notes within 48 hours of interview • Be neutral • Seek diverse views

Authorization

Process of allowing or restricting a specific authentication user's access to a specific resource based on an access control list

encryption

Process of altering data so unauthorized users can't view them

Multi-Factor Authentication

Process of using multiple authentication methods for increased reliability

A) they each describe different but complementary views of the same information system

Process, logic, and data model descriptions of a system must be consistent and complete because: A) they each describe different but complementary views of the same information system B) they are prepared during the analysis phase C) they are constructed in parallel by separate analyst teams D) programming tasks require the integration of the information contained in the diagrams

False

Prototypes and mock-ups are most useful in doing the design of the software classes.

B) communication problems have existed in the past between users and analysts

Prototyping is most useful for requirements determination when: A) user requirements are well understood B) communication problems have existed in the past between users and analysts C) possible designs are simple and require an abstract form to fully evaluate D) multiple stakeholders are involved with the system

open-ended questions

Questions in an interview that have no pre-specified answers

B) closed-ended questions

Questions in interviews asking those responding to choose from among a set of specified responses are: A) specific questions B) closed-ended questions C) open-ended questions D) structured questions

Closed-ended Questions

Questions in interviews that ask those responding to choose from among a set of specified answers.

Open-ended questions

Questions in interviews that have no pre-specified answers

C) open-ended questions

Questions in interviews that have no pre-specified answers are: A) nonspecific questions B) closed-ended questions C) open-ended questions D) investigative questions

Open-Ended Questions

Questions in interviews that have no prespecified answers.

Most NoSQL data stores were created to address problems associated with storing large amounts of distributed data in ___.

RDBMSs

C) closed-ended question

Rating a response or idea on some scale, say from strongly agree to strongly disagree, would be classified as a(n): A) open-ended question B) JAD question C) closed-ended question D) ranking question

A) process

Recording a customer's payment is represented on a data flow diagram as a: A) process B) source C) data flow D) data store

B) Planning Game

Referencing eXtreme programming, which of the following is a stylized approach to development that seeks to maximize fruitful interaction between those who need a new system and those who built it? A) Iteration Planning Game B) Planning Game C) eXtreme Walkthrough D) eXtreme JAD

B) design

Referencing eXtreme programming, which of the following is not a Planning Game phase? A) exploration B) design C) commitment D) steering

D) steering

Referencing eXtreme programming, which of the following is the final phase of the Planning Game? A) exploration B) design C) commitment D) steering

A) programmers

Referencing eXtreme programming, who plays the Iteration Planning Game? A) programmers B) business managers and analysts C) end users, business managers, and analysts D) programmers, analysts, and end users

Modality

Refers to whether or not an instance of a child entity can exist without a related instance in the parent entity

Dependent Entity

Relationships when a child entity does require attributes from the parent entity to uniquely identify an instance

B) decision table

Removing any rules with impossible actions to make which of the following simple as possible? A) activity diagram B) decision table C) structure chart D) hierarchical chart

use case

Represents the steps in a specific business function or process in UML.

Independent random sampling

Requires that each individual has an equal chance of being selected and that the probability of being selected stays constant from one selection to the next if more than one individual is choosen

Random Sampling

Requires that each individual in the population has an equal chance of being selected

True

Security design and encryption issues are addressed during database design.

state transition diagram

Shows how an object changes from one state to another, depending on the events that affect the object.

Binomial distribition

Shows the probability associated with each value of x

system boundary

Shows what is included and excluded from a system.

system boundary

Shows what is included and excluded from a system. Depicted by a shaded rectangle in use case diagrams.

Managed Processes

Significant quantitative and qualitative improvements are possible because the process itself is managed and evolutionary. Each technology implementation is part of an overall architecture.

False

Since the design activities all interact with each other, it really doesn't matter which activity occurs first.

False

Since the design activities all interact with each other, it really doesn't matter which activity occurs first.​

design class diagram

Software methods are usually identified in which design model?

Design class diagram

Software methods are usually identified in which design model?​

D) all of the above

Some systems developers believe that a data model is the most important part of the statement of information system requirements because: A) the characteristics of data captured during data modeling are crucial in the design of databases, programs, computer screens, and printed reports B) data rather than processes are the most complex aspects of many modern information systems and thus require a central role in structuring system requirements C) the characteristics about data are reasonably permanent D) all of the above

D) business rules

Specifications that preserve the integrity of the logical data model are: A) requirements specifications B) integrity restrictions C) business limitations D) business rules

B) data flow

Student data contained on an enrollment form is represented on a data flow diagram as a: A) process B) data flow C) source D) data store

False

Symmetric key encryption uses a public key and a private key.​

True

Synchronization bars are used to indicate looping in an activity diagram.

Digital Signature

Technique in which a document is encrypted by using a private key to verify who wrote the document

A) JAD

Techniques developed to keep the analysis effort minimal, yet still effective include: A) JAD B) interviewing C) observations D) quiz sessions

-Content Filtering -Encryption -Firewalls

Technologies available to help prevent and build resistance to attacks include?

Disruptive technologies

Technologies that enable that breaking of long-held business rules that inhibit organizations from making radical business changes

C) disruptive technologies

Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes best defines: A) technology barriers B) business process reengineering C) disruptive technologies D) business constraints

Disruptive Technologies

Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes.

Disruptive technologies

Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes.

Action Stubs

That part of a decision table that ists the actions that result for a given set of conditions

Condition Stubs

That part of a decision table that lists the conditions relevant to the decision

Rules

That part of a decision table that specifies which actions are to be followed for a given set of conditions

True

The CRUD technique can be used to identify new use cases as well as delete unnecessary use cases.​

Let the customer object do it.

The Sales subsystem needs to instantiate a new cart object. How should this be done?

use case diagram and the problem domain class diagram

The ____ are the primary models from which other models draw information.​

adapter

The _____________ pattern can be used to connect two disparate systems.

factory

The _______________ pattern is used to instantiate objects as a service.

(Fraud Triangle) Opportunity

The ability of a person to take actions that perpetrate a fraud. ex. unrestricted access to all functions of an accounts payable system enables an employee to generate false vendor payments

C) functional decomposition

The act of going from a single system to several component processes refers to: A) structuring B) balancing C) functional decomposition D) formatting

​Before the object enters the destination state.

The action-expression occurs when?​

pseudostate

The beginning state of an object when its states are diagrammed is called a ___________.​

False

The best use of the CRUD technique is used to generate new use cases.

False

The cardinality of a class is a measure of the number of objects in the class.​

polymorphism

The concept that a message gives different meanings to different objects

Polymorphism

The concept that a message gives different meanings to different objects (e.g., a GOOD NIGHT message might produce different results depending on whether it is received by a child or the family dog).

Time value of money

The concept that money available today is worth more than the same amount tomorrow

B) action

The condition that causes the operation to be triggered: A) condition B) action C) entity name D) user rule

Balancing

The conservation of inputs and outputs do a data-flow diagram process when that process is decomposed to a lower level.

B) balancing

The conservation of inputs and outputs to a data flow diagram process when that process is decomposed to a lower level defines: A) decomposition B) balancing C) conservation D) data flow structuring

instantiation

The creation of a programming object based on the template provided by the class definition is called _______.

cardinality

The crows feet notation on an ERD is a type of _______ constraint.

Present Value

The current value of a future cash flow

D) event

The data manipulation operation (insert, delete, or update) that initiates the operation is called a(n): A) condition B) action C) user rule D) event

A) top-down approach

The data modeling perspective that derives the business rules for a data model from an intimate understanding of the nature of the business, rather than from any specific information requirements in screens, reports, or business forms, is referred to as the: A) top-down approach B) bottom-up approach C) overview approach D) business approach

B) what you learned during requirements determination

The deliverables of process modeling state: A) how you should develop the system during physical design B) what you learned during requirements determination C) how you should implement the new system during implementation D) what you learned during project planning

Describe the environment

The design activity key question, "How will this system interact with other systems..." is part of which design activity?

Design the software classes

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?

​Design the software classes

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?

Why is the environment "DESCRIBED" while other key design elements such as the user interface and database are "designed"?

The designer of a single system has little or no control over the environment

Defined Processes

The development process is both implemented and understood. Measurements are taken, and the process is predictable enough to allow one to forecast the effect of implementing new technologies.

Short release

The development team compresses the time between releases of the product. Rather than release a full-blown version in a year, they will shorten the release time by tackling the most important features first, release that system or product, and then improve it later.

activity

The diagram model that is useful to document the flow of activities on a fully developed use case description is called a _______ diagram.

A) context diagram

The diagram that shows the scope of the system, indicating what elements are inside and which are outside the system, is called a: A) context diagram B) level-2 diagram C) referencing diagram D) representative diagram

Database design

The domain model is always used as an input to which design activity?

digital signature

The encoding of a message with a private key is called ____________________.

digital signature

The encoding of a message with a private key is called ____________________.​

Probability

The expected relative frequency of a particular outcome Results of an experiment Cannot be less than zero or greater than one Always between 0 & 1

DFD Completeness

The extent to which all major components of a data-flow diagram have been included and fully described.

B) DFD completeness

The extent to which all necessary components of a data flow diagram have been included and fully described refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility

A) DFD consistency

The extent to which information contained on one level of a set of nested data flow diagrams is also included on other levels refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility

DFD consistency

The extent to which information contained on one level of a set of nested data-flow diagrams is also included on other levels.

package diagrams

The final step in the object-oriented design (OOD) process consists of developing the ____.

False

The first step in object-oriented design is to develop the design class diagram.

False

The first-cut DCD includes method signatures.

true/false condition

The following is the message syntax for an SSD. "[ _________ ] return-value := message-name (parameter-list)" What is missing?

Order is an object. anOrd is the reference to that object

The following notation "anOrd:Order" can be interpreted as follows:

whole-part

The general relationship between classes in which one class is a part or component of another class is called a _______ relationship.​

object-oriented design

The general term that refers to the process to identify the set of classes, their methods and the messages to execute a use case is called ______ ______ ______.

Whether the transition fires.

The guard-condition on a transition indicates what?​

Encapsulation

The idea that all data and methods are self-contained, as in a black box.

encapsulation

The idea that all data and methods are self-contained, as in a black box.

inheritance

The idea that the attributes of a superclass are also attributes of a subclass is called ______.​

B) Your role is to find the best solution to a business problem or opportunity.

The impartiality characteristic of a good systems analyst is represented by which of the following statements? A) You must challenge yourself to look at the organization in new ways. B) Your role is to find the best solution to a business problem or opportunity. C) Assume anything is possible, and eliminate the infeasible. D) You should question everything.

D) You should question everything.

The impertinence characteristic of a good systems analyst is represented by which of the following statements? A) You must challenge yourself to look at the organization in new ways. B) Every fact must fit with every other fact. C) Assume anything is possible, and eliminate the infeasible. D) You should question everything.

business case

The justification for an information system, presented in terms of the tangible and intangible economic benefits and costs and the technical and organizational feasibility of the proposed system

True

The key question to answer with the design of the user interface activity is, "How will the users interact with the system?"​

Users.

The key users of the system under consideration are vital participants in a JAD. They are the only ones who have a clear understanding of what it means to use the system on a daily basis.

Implementation

The last phase of the systems development life cycle, in which an analyst ensures that the system is in operation and then allows users to take over its operation and evaluation.

D) primitive data flow diagrams

The lowest level of DFDs is called: A) level-0 diagrams B) context diagrams C) level-1 diagrams D) primitive data flow diagrams

D) primitive diagram

The lowest level of decomposition for a data flow diagram is called the: A) context diagram B) level-0 diagram C) level-1 diagram D) primitive diagram

Primitive DFD

The lowest level of decomposition for a data-flow diagram

True

The majority of new systems today must be integrated into existing networks without disrupting existing applications.

Competitive Strategy

The method by which an organization attempts to achieve its mission and objectives

B) minimum cardinality of the relationship

The minimum number of instances of entity B that may be associated with each instance of entity A defines the: A) degree of the relationship B) minimum cardinality of the relationship C) maximum cardinality of the relationship D) domain of the relationship

B) Entity-relationship

The most common format used for data modeling is: A) state-transition diagramming B) entity-relationship diagramming C) process modeling D) decision table diagramming

network and computer operating systems

The most common security control points are _____________________ because they exercise direct control over such assets as fields, application programs, and disk drives.

transition

The movement of an object from one state to another is done through the process of a ___________.​

False

The noun technique can be thought of as a variation of the brainstorming technique.​

cardinality

The number of associations that occur among specific things in an entity relationship diagram is called ____.

A) cardinality

The number of instances of entity B that can (or must) be associated with each instance of entity A refers to: A) cardinality B) domain C) ternary occurrence D) participation level

build a new system

The objective of Implementation is to

True

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.

Formal System

The official way a system works as described in an organization's documentation

A) formal system

The official way a system works as described in organizational documentation is referred to as a(n): A) formal system B) informal system C) official system D) desired system

Formal System

The official way a system works as described in organizational documentation.

Formal system

The official way a system works as described in organizational documentation. Informal system: the way the system actually works

False

The only difference between a domain class diagram and a design class diagram is the addition of the methods.

Systems analyst

The organizational role most responsible for the analysis and design of information systems. Primary role - study the problems and needs of an organization in order to determine how people, methods, and information technology can be best combined to bring improvements

A) source/sink

The origin and/or destination of data, sometimes referred to as external entities defines: A) source/sink B) data store C) data flow D) process

Source/sink

The origin and/or destination of data; sometimes referred to as external entities

True

The output of the design activities is a set of diagrams and documents that describe the solution system.​

B) rules

The part of a decision table that links conditions to actions is the section that contains the: A) action statements B) rules C) condition statements D) decision stubs

B) condition stubs

The part of a decision table that lists the actions that result for a given set of conditions is called: A) action stubs B) condition stubs C) rule section D) condition execution

C) rules

The part of a decision table that specifies which actions are to be followed for a given set of conditions refers to: A) action stubs B) condition list C) rules D) decision list

issues related to technology are ignored

The perfect technology assumption implies that _______.

True

The perfect technology assumption means not to worry about issues such as user security.

Scribe

The person who makes detailed notes of the happenings at a Joint Application Design Session.

B) scribe

The person who makes detailed notes of the happenings at a Joint Application Design session is referred to as the: A) JAD analyst B) scribe C) JAD manager D) JAD session leader

Scribe:

The person who makes detailed notes of the happenings at a Joint Application Design session.

Scribe

The person who makes the detailed notes of the happenings at a Joint Application Design session

true/false condition

The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.

B) E-R diagram

The primary deliverable from the conceptual modeling step within the analysis phase is a(n): A) state-transition diagram B) E-R diagram C) context data flow diagram D) decision tree

D) all of the above

The primary deliverables from requirements determination include: A) sets of forms, reports, and job descriptions B) transcripts of interviews C) notes from observation and from analysis documents D) all of the above

True

The primary difference between a design class symbol and a problem domain class symbol is the addition of method signatures.

design class and interaction

The primary models used for OO detailed design are ____ diagrams.

False

The primary purpose of integrity controls is to track external activity.

D) gap analysis

The process in analysis in which the analyst tries to discover discrepancies between two or more sets of data flow diagrams, representing two or more states of an information system, or discrepancies within a single DFD, is referred to as: A) double checking B) sequencing C) referencing D) gap analysis

Affinity Clustering

The process of arranging planning a matrix information so that clusters of information with a predetermined level or type of affinity are placed next to each other on a matrix report

legal and contractual feasibility

The process of assessing potential legal and contractual ramifications due to the construction of a system

Operational feasibility

The process of assessing the degree to which a proposed system solves business problems or takes advantage of business opportunity

Schedule feasibility

The process of assessing the degree to which the potential time frame and completion dates for all major activities within a project meet organizational deadlines and constraints for affecting change

Decryption

The process of converting encrypted data back to their original state

Gap Analysis

The process of discovering discrepancies between two or more sets of data-flow diagrams or discrepancies within a single DFD

Political feasibilty

The process of evaluating how key stakeholders within the organization view the proposed system

Authentication

The process off identifying users who request access to sensitive resources

False

The project plan is required to get the project approved.

Discount rate

The rate of return used to compute the present value of future cash flows

interaction

The realization of a use case-determining what objects collaborate by sending messages to each other to carry out the use case-is done through the development of a ____ diagram.

A) You must challenge yourself to look at the organization in new ways.

The reframing characteristic of a good systems analyst is represented by which of the following statements? A) You must challenge yourself to look at the organization in new ways. B) Every fact must fit with every other fact. C) Assume anything is possible, and eliminate the infeasible. D) You should question everything

Business Process Re-engineering

The search for and implementation of, radical change in business processes to achieve breakthrough improvements in products and services

Business process reengineering (BPR)

The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services

D) business process reengineering

The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services best defines: A) Joint Application Design B) Rapid Application Development C) structured programming D) business process reengineering

Business Process Reengineering (BPR)

The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services.

C) domain

The set of all data types and ranges of values that an attribute can assume defines: A) cardinality B) constraint set C) domain D) reference set

problem domain

The specific area of the user's business need that is within the scope of the new system is called the _______.​

Key business processes

The structured, measured set of activities designed to produce a specific output for a particular customer or market

B) key business processes

The structured, measured set of activities designed to produce a specific output for a particular customer or market best defines: A) formal systems B) key business processes C) secondary activities D) production systems

Key Business Processes

The structured, measured set of activities designed to produce a specific output for a particular customer or market.

Key business processes

The structured, measured set of activities designed to produce a specific output for a particular customer or market.

D) a rectangle with rounded edges

The symbol for an activity is: A) a square B) a circle C) an arrow D) a rectangle with rounded edges

synchronization bar

The symbol that is used to initiate concurrent paths in a state machine diagram is what?​

noun technique

The technique for finding problem domain objects by finding and listing all the nouns in a dialog or description is called the _______.​

navigation visibility

The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.

cohesion

The term "_______" is a measure of the focus or unity of purpose within a single class.

class-level attribute

The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.

B) analysis paralysis

The term used to refer to systems development projects bogged down in an abundance of analysis work is: A) information overload B) analysis paralysis C) analysis overload D) information abundance

B) data flows

The three main constructs of the entity-relationship modeling notation include each of the following except: A) data entities B) data flows C) relationships D) attributes

SDLC

The traditional methodology used to develop, maintain, and replace information systems

JAD session leader

The trained individual who plans and leads JAD sessions

JAD Session Leader

The trained individual who plans and leads Joint Application Design Sessions.

B) JAD session leader

The trained individual who plans and leads Joint Application Design sessions is referred to as the: A) scribe B) JAD session leader C) JAD manager D) JAD contributor

JAD session leader

The trained individual who plans and leads Joint Application Design sessions.

D) all of the above

The typical participants in a JAD include: A) a session leader B) a scribe C) a sponsor D) all of the above

Electronic data interchange

The use of telecommunications technologies to directly transfer business documents between organizations

Informal system

The way a system actually works

B) informal system

The way a system actually works is referred to as a(n): A) unofficial system B) informal system C) actual system D) formal system

Informal System

The way a system actually works.

Process

The work or actions performed on data so that they are transformed, stored, or distributed

D) process

The work or actions performed on data so that they are transformed, stored, or distributed defines: A) source/sink B) data store C) data flow D) process

Ad Hoc processes

There is no development methodology, and few, if any, controls are in place. Progress, even if attainable, may not be recognized because of lack of measurement.

40-hour workweek

This core practice attempts to motivate team members to work intensely at the job, and then to take time off so that when they return they are relaxed and less stressed; reinforces the idea that working overtime for more than a week in a row is very bad for the health of the project and the developers.

unauthorized user, registered user, and privileged user

Three types of users that are considered in the design of a security system are ____.

unauthorized user, registered user, and privileged user

Three types of users that are considered in the design of a security system are ____.​

D) multiply the number of values for each condition by the number of values for every other condition

To determine the number of rules required for the decision table, you would: A) add the number of values for each condition to the number of values for every other condition B) multiply the number of conditions by two C) add the number of values for each condition to the number of values for every other condition, then subtract 1 D) multiply the number of values for each condition by the number of values for every other condition

opt frame

To show a set of messages that may be optional a __________ is used.

alt frame

To show if-then-else condition on a sequence diagram use a ______.

User stories

Tool used in Agile software development to capture a description of a software feature from an end-user perspective. The user story describes the type of user, what they want and why. A user story helps to create a simplified description of a requirement.

D) all of the above

Traditional methods of collecting systems requirements include: A) individual interviews B) observing workers C) group interviews D) all of the above

A file contains an electronic list of information that is formatted for a particular transaction, and the information is changed and manipulated by programs that are written for those purposes.

True

An audit file contains information about how data changes over time; it records before and after images of data as it is altered so that it can be validated later.

True

Key-value data stores is a type of NOSQL data stores, and they essentially provide a distributed index (primary key) to where a BLOB (binary, large object) is stored.

True

Sequential access files are very efficient for operations such as report writing.

True

The Relational DBMS only supports simple data types, but the Object Relational DBMS supports both simple and complex data types.

True

The most efficient tables in a relational database in terms of storage space have no redundant data and very few null values because the presence of these suggest that space is being wasted, and more data to store means higher data storage hardware costs.

True

The normalization process is performed primarily to increase the database's storage efficiency.

True

The process of adding redundancy back into a physical data model is known as denormalization.

True

Update anomalies occur when some instances of redundantly stored data are overlooked when an update occurs.

True

False

Two difference scenarios of a use case would normally be described in a single fully developed use case description.​

Asterisk *, Loop frame

Two methods to show a repeating message are: (Choose two)

Dashed arrow with value,value :=

Two methods to show a return value are: (Choose two)

False

Two techniques to identify things in the problem domain are the noun technique and the verb technique.

____ is a widely used method of visualizing and documenting an information system.

UML

stereotyping

UML provides a technique to extend the standard UML notation to include new symbols. This technique is called ________.

scenario

Use cases may have different "paths" or sequence of steps through the use case. These different paths are called _______.

Requirements planning phase

Useful in determining scope and assigning resources: Time, Cost, Quality.

True

User interface design requires both analysis and design.​

view or boundary

User interface objects in a sequence diagram often are labeled with the stereotype ____.

verifying who sent a document

Using digital signatures is primarily a technique to ____.

verifying who sent a document

Using digital signatures is primarily a technique to ____.​

lifeline

Vertical dashed lines on a system sequence diagram are used to depict a what?

create problem domain classes

View layer classes should do all of the following EXCEPT _______.

False

Visibility is a design property that indicates whether a class can be "seen" by the user interface classes.

(Design Activities: Key Question) Design the application components

What are the key parts of the information system and how will they interact when the system is deployed?

Key Question for: Design the application components

What are the key parts of the information system and how will they interact when the system is deployed?

External systems and technology architecture

What are two key elements of describing the environment?

method signature

What do we call the notation that shows all the information required to call or invoke a method?

(Design Activities: Key Question) Design the software classes and methods

What internal structure for each application component will ensure efficient construction, rapid deployment, and reliable operation?

Key question for: Design the software classes and methods

What internal structure for each application component will ensure efficient construction, rapid deployment, and reliable operation?

Value limit control

What is a control that checks the value of a field to ensure that it is within the correct range?

Replace the :System object with all the objects that must collaborate

What is the first step in constructing a first-cut sequence diagram from the elements of the system sequence diagram (SSD)?

Define a single controller for all use cases.

What is the least cohesive approach in creating use case controllers in a system?

Data validation control

What is the name of a general control technique used to ensure that entered data is correct?

Completeness control

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

Completeness control

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​

To validate the set of defined use cases

What is the primary purpose of the CRUD technique?

use case realization

What is the process of detail design for a particular use case by elaborating the messages that are necessary to execute the use case?

Protection from variations

What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?

class-level method

What is the term to denote a method that is invoked on a class instead of on an object?

visibility

What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?

Expected relative frequency

What you expect to get in the long run if you repeated the experiment many times Flipped a coin eventually you would have half and half

factory

When a domain object needs to create a utility object, such as a data access object, it often will use a design pattern called the _______ pattern.

a method is being invoked on the destination object

When a message is sent from an originating object to a destination object it means that ______.

begins the process to initialize the necessary data access objects in memory

When a use case controller receives the initial request for an inquiry when the data access layer is added, it first ____.

destination state

When an object moves from one state to another the ending state is a called a __________.

Is it a synonym of an existing thing? Is it an output from the system?

When analyzing the list of nouns to determine whether to EXCLUDE a particular noun as an important "thing," which of the following questions should be asked about the noun? (choose two)

Is it unique? Are there multiple instances of it?

When analyzing the list of nouns to determine whether to INCLUDE a particular noun as an important "thing," which of the following questions should be asked about the noun?

C) the potential audience of the observation method is limited

When comparing observations and document analysis: A) the time required to conduct observations compared to document analysis is low B) the observee is not known to the interviewer C) the potential audience of the observation method is limited D) with document analysis, a clear commitment is discernible

D) limited entry

When condition values are either "yes" or "no", these values are called a(n): A) extended entry B) simple entry C) complex entry D) limited entry

Programming languages

When describing the interfaces to external systems, which is not one of the important issues?

Programming languages

When describing the interfaces to external systems, which is not one of the important issues?​

False

When identifying things in the problem domain, an analyst should focus primarily on tangible things about which information is required.​

On a project that uses iterations to develop the system, in which iteration does system design begin?

When iterative approach of SLDC is used, major design decisions are made in the first or second iteration; however, many decisions are revisited and refined during later iterations

Should it be researched further?

When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions?​

C) choose a candidate key that will not change its value over the life of each instance of the entity type

When selecting an identifier, one should: A) use intelligent keys B) use large composite keys instead of single-attribute surrogate keys C) choose a candidate key that will not change its value over the life of each instance of the entity type D) choose a candidate key such that for each instance of the entity, the attribute is guaranteed to have valid values or is null

private

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a ____ key.

True

When using the brainstorming technique it is often helpful to think about each use case and talking to users.

True

When using the noun technique, the analyst begins by listing all the nouns that the users mention.

camelcase

When words are concatenated together to form a single word and the first letter of each is capitalized it is called _______ notation.​

C) primitive data flow diagrams

When you believe that you have shown each business form or transaction, computer screen, and report as a single data flow, you have probably reached the: A) level-0 diagrams B) level-1 diagrams C) primitive data flow diagrams D) level-3 diagrams

Security and controls design

Which design activity that pervades all other design activities?

Security and controls design

Which design activity that pervades all other design activities?​

Interaction diagram

Which design model provides information for a design class diagram?

Ensure a stable functioning operating environment

Which is NOT an objective of integrity controls?

* [true/false]RetVal := name (param)

Which is the correct notation for a message label on a sequence diagram?

Class Diagram

Which model is most useful in developing a State Machine Diagram

A) referential integrity constraints

Which of the following addresses the rules concerning the relationships between entity types? A) referential integrity constraints B) triggering operations C) entity integrity D) domains

Attributes, Responsibilities

Which of the following are information items on CRC cards. (Choose two)

System programmers, application programmers, and system administrators

Which of the following can be classified as privileged users?

System programmers, application programmers, and system administrators

Which of the following can be classified as privileged users?​

Description of when the pattern does not apply

Which of the following is NOT a component of the design pattern template?

Authorization of users

Which of the following is NOT a factor that affects the risk of fraud?

Authorization of users

Which of the following is NOT a factor that affects the risk of fraud?​

Expand the name of each state to identify concurrent activities.

Which of the following is NOT a step in the development of a state machine diagram?

Relationship line

Which of the following is NOT a valid construct as part of an activity diagram?

A return condition name

Which of the following is NOT a valid technique to return data from an input message?

developing new models allows the analyst to discard unnecessary diagrams.

Which of the following is NOT an advantage of object-oriented modeling with several models is that _____.​

trigger

Which of the following is NOT an element in a transition label?

Activity diagram

Which of the following is NOT considered a design model?

D) Scheduling group interviews can be a problem.

Which of the following is a disadvantage to group interviewing? A) Group interviewing does not effectively utilize your time. B) Interviewing several people together allows them to hear the opinions of other key people. C) Group interviewing requires significantly more time than does the JAD process. D) Scheduling group interviews can be a problem.

A superior/subordinate relationship is usually navigated from the superior to the subordinate class

Which of the following is a general guideline for designing navigation visibility?

C) People often do not have a completely accurate appreciation of what they do or how they do it.

Which of the following is a reason for directly observing end users? A) The analyst gets a snap-shot image of the person or task being observed. B) Observations are not very time consuming. C) People often do not have a completely accurate appreciation of what they do or how they do it. D) Employees will alter their performance if they know that they are being observed.

B) Group interviews

Which of the following is a traditional method of collecting systems requirements? A) Group support systems B) Group interviews C) Joint Application Design D) Rapid Application Development

A) The primary purpose of using JAD in the analysis phase is to collect systems requirements simultaneously from the key people involved with the system.

Which of the following is a true statement regarding JAD? A) The primary purpose of using JAD in the analysis phase is to collect systems requirements simultaneously from the key people involved with the system. B) JAD follows a particular structure of roles and agenda that are similar to the group interview. C) JAD sessions are usually conducted in the organization's conference room. D) A JAD session is inexpensive to conduct

C) A data store has a noun phrase label.

Which of the following is a true statement regarding a data store? A) Data can move directly from one data store to another data store. B) Data can move directly from a sink to a data store. C) A data store has a noun phrase label. D) Data can move from an outside source to a data store.

D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.

Which of the following is a true statement regarding data flows? A) A data flow may have multiple directions between symbols. B) A data flow to a data store means retrieve or use. C) A data flow from a data store means update. D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.

D) All of the above.

Which of the following is a true statement regarding sources/sinks? A) Sources/sinks are always outside the information system and define the boundaries of the system. B) Data must originate outside a system from one or more sources. C) The system must produce information to one or more sinks. D) All of the above.

C) An information system design based on a data orientation, rather than a process or logic orientation, should have a longer useful life.

Which of the following is a true statement? A) Data characteristics are dynamic. B) A data model explains the transient form of an organization. C) An information system design based on a data orientation, rather than a process or logic orientation, should have a longer useful life. D) Data flow paths are permanent.

A) Interviews based on closed-ended questions do not necessarily require a large time commitment, so more topics can be covered.

Which of the following is an advantage of closed-ended questions? A) Interviews based on closed-ended questions do not necessarily require a large time commitment, so more topics can be covered. B) Closed-ended questions enable the analysts to explore information that does not quite fit defined answers. C) The analyst can obtain previously unknown information. D) Closed-ended questions often put the interviewee at ease

Communication diagram

Which of the following is an example of an interaction diagram?

D) none of the above

Which of the following is considered when diagramming? A) the interactions occurring between sources and sinks B) how to provide sources and sinks direct access to stored data C) how to control or redesign a source or sink D) none of the above

Stereotype name

Which of the following is included in the top compartment of a design class?

A) interviewing

Which of the following is not a contemporary method for determining system requirements? A) interviewing B) group support systems C) CASE tools D) Joint Application Design

D) Test each program module separately from every other program module, and then perform system testing.

Which of the following is not a step in the Agile Usage-Centered Design Method? A) Give everyone a chance to vent about the current system and to talk about the features every one wants in the new system. B) Determine what the most important user roles would be. C) Determine what tasks user roles will have to complete in order to achieve their goals. D) Test each program module separately from every other program module, and then perform system testing.

B) A data flow can go directly back to the same process it leaves.

Which of the following is not a true statement regarding data flows? A) A fork in a data flow means that exactly the same data goes from a common location to two or more different processes, data stores, or sources/sinks. B) A data flow can go directly back to the same process it leaves. C) A data flow has a noun phrase label. D) A data flow has only one direction of flow between symbols.

B) JAD

Which of the following is not an Agile Methodologies requirements determination technique? A) Planning Game B) JAD C) Agile Usage-Centered Design D) continual user involvement

C) Composite data flows on one level cannot be split into component data flows at the next level.

Which of the following is not an advanced rule governing data flow diagramming? A) To avoid having data flow lines cross each other, data stores may be repeated on a DFD. B) At the lowest level of DFDs, new data flows may be added to represent data that are transmitted under exceptional conditions. C) Composite data flows on one level cannot be split into component data flows at the next level. D) The inputs to a process must be sufficient to produce the outputs from the process.

Design the security controls

Which of the following is not one of the design activities included in the Design System Components core process?​

D) state-transition diagram

Which of the following is not one of the primary deliverables resulting from studying and documenting a system's processes? A) context data flow diagram (DFD) B) thorough descriptions of each DFD component C) DFDs of the current logical system D) state-transition diagram

The input window is coupled to the domain and the domain is coupled to the database.

Which of the following is the best coupling choice for an input window, domain, and database object in a system?

System Sequence Diagrams

Which of the following is the best model to use to document the inputs and the outputs to a system?​

D) steering

Which of the following is the eXtreme Programming Planning Game phase where Business has a chance to see how the development process is progressing and to work with Development to adjust the plan accordingly? A) commitment B) exploration C) choice D) steering

They are executed by the class instead of a specific object of the class.

Which of the following is true of class-level methods?

Method signatures

Which of the following is usually NOT included in a first-cut design class diagram?

​visibility name(parameter list):type-expression

Which of the following is valid Unified Modeling Language (UML) notation for a method signature?

User interface design

Which of the following really is both an analysis (discovery) and a design process (solution).

B) triggering operations

Which of the following refers to an assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete? A) referential integrity constraints B) triggering operations C) entity integrity D) domains

D) domains

Which of the following refers to the set of all data types and values that an attribute can assume? A) referential integrity constraints B) triggering operations C) entity integrity D) domains

D) overlap rule

Which of the following specifies that an entity instance can simultaneously be a member of two (or more) subtypes? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule

B) partial specialization rule

Which of the following specifies that an entity instance of the supertype is allowed not to belong to any subtype? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule

A) total specialization rule

Which of the following specifies that each entity instance of the supertype must be a member of some subtype in the relationship? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule

C) entity integrity

Which of the following specifies that each instance of an entity type must have a unique identifier that is not null? A) referential integrity constraints B) triggering operations C) entity integrity D) domains

C) disjoint rule

Which of the following specifies that if an entity instance of the supertype is a member of one subtype it cannot simultaneously be a member of any other subtype? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule

B) distributed databases

Which of the following technologies disrupted the business rule that information can appear only in one place at a time? A) high-performance computing B) distributed databases C) expert systems D) advanced telecommunications networks

A) eXtreme programming

Which of the following was developed by Kent Beck, and is distinguished by its short cycles, its incremental planning approach, its focus on automated tests written by programmers and customers to monitor the process of development, and its reliance on an evolutionary approach to development that lasts throughout the lifetime of the system? A) eXtreme programming B) evolutionary prototyping C) rapid application development D) object-oriented analysis and design

Registered user

Which user is known to the system and is authorized to access all or certain parts of it?

Registered user

Which user is known to the system and is authorized to access all or certain parts of it?​

Certifying Authorities

Widely accepted issuers of digital certificates

Package

____ diagrams partition a design class diagram into related functions.

cohesion

____ is a qualitative measure of the consistency of functions within a single class.

Unary association

____ is used to describe the relationship between two things of the same type, such as one person being married to another person.​

Generalization/Specialization

_____ is based on the idea that people classify things in terms of similarities and differences.​

Authorization

_______ is the process of allowing or restricting a specific user's access to specific resources.

Authorization

_______ is the process of allowing or restricting a specific user's access to specific resources.​

Multiplicity Constraints

_______ is used to describe the actual range of linkups allowed in an association (the minimum and maximum values).​

Authentication

____________________ is the process of identifying a user to verify that he or she can have access to the system.

Authentication

____________________ is the process of identifying a user to verify that he or she can have access to the system.​

encryption key

a binary input to the encryption algorithm - typically a long string of bits

three-layer architecture

a client/server architecture that divides an application into view layer, business logic layer, and data layer

Virtual Private Networks (VPNs)

a closed network with security and closed access built on top of a public network, such as the Internet

Agile Modeling

a collection of innovative, user-centered approaches to system development.

encryption algorithm

a complex mathematical transformation that encrypts or decrypts binary data

client-server architecture

a computer network configuration with user's computers and central computers that provide common services

local area network (LAN)

a computer network in which the cabling and hardware are confined to a single location

access control

a control that limits a users ability to access resources, such as servers, files, web pages, application programs, and database tables.

Project Management

a controlled process that involves the 4 phases of initiating, planning, executing, and closing down a project

Smart Card

a device that is around the same size as a credit card, containing embedded technology that can store information and small amounts of software to perform some limited processing

Network Diagram

a diagram that depicts project tasks and interrelationships. The ordering of tasks is shown by connecting tasks

Request for Proposal

a document provided to vendors that asks them to prepare hardware and system software that will meet the requirements of a new system - a way to collect more information about system software, its performance, and its cost

public key encryption

a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption

Gantt Chart

a graphical representation of a project that shows each task as a horizontal bar whose length is proportional to its time for completion

colocation

a hosting service with a secure location but in which the computers are usually owned by the client businesses

access control list

a list attached or linked to a specific resource that describes users or user groups and the nature of permitted access

Object class

a logical grouping of objects that have the same (or similar) attributes and behaviors (methods)

virtual server

a method to partition the services of a physical Web server so it appears as multiple, independent Internet servers

fraud triangle

a model of fraud that states that opportunity, motivation, and rationalization must all exist for a fraud to occur

network diagram

a model that shows how the application is deployed across networks and computers

Nonoperational Scale Models

a nonworking scale model that is set up to test certain aspects of the design; produced when the coding required by the application is too expensive to prototype but when a useful idea of the system can be gained through prototyping of the input and output only.

Project

a planned undertaking of related activities to reach an objective that has a beginning and an end

Critical Path Scheduling

a scheduling technique whose order and duration of a sequence of task activities directly affect the completion date of a project, example: network diagramming

remote wipe

a security measure that automatically deletes sensitive data from a portable device when unauthorized accesses are attempted

content delivery network (CDN)

a set of server computers, separate from the hosting computers, used to deliver such static content as images or videos

Project Charter

a short document prepared for the customer during the project initiation that describes what the project will deliver and outlines generally at a high level all work required to complete the project

Secure Sockets Layer (SSL)

a standard set of methods and protocols that address authentication, authorization, privacy, and integrity

Feasibility Study

a study that determines if the proposed information system makes sense for the organization from an economic and operational standpoint

Enterprise Resource Planning

a system that integrates individual traditional business functions into a series of modules so that a single transaction occurs seamlessly within a single information system rather than several separate systems

Patched-Up Prototype

a system that works but is patched up or patched together; a working model that has all the features but is inefficient. - users can interact with the system - retrieval/storage of info. may be inefficient

Project Manager

a systems analyst with a diverse set of skills: management, leadership, technical, conflict management, and customer relationship - who is responsible for initiating, planning, executing, and closing down a project

digital signiture

a technique in which a document is encrypted by using a private key to verify who wrote the document

Program Evaluation Review Technique (PERT)

a technique that uses optimistic, pessimistic, and realistic time estimates to calculate the expected time for a particular task

application component

a well-defined unit of software that performs one or more specific tasks

Direct approach

abandon old system and start up new system

Phase 4: Systems Development

acquire software, acquire hardware, test the new system


Related study sets

Accounting 711 Garrison Chapter 6

View Set

Chapter 12: Conception & Fetal Development

View Set

Live Virtual Machine Lab 7.3: Module 07 Cloud Concepts

View Set

Ethics of Cybersecurity - Exam 1

View Set

Module 2: Basic Switch and End Device Configuration

View Set

Chapter 48 - Neurons, Synapses, and Signaling

View Set

Chapter 13 Lesson 3: Layers of Atmosphere

View Set

RD Exam Domain III Practice Questions

View Set